Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Daniel Zelle, Markus Springer, Maria Zhdanova, Christoph Krauß |
Anonymous Charging and Billing of Electric Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 22:1-22:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Vaibhavi Kalgutkar, Natalia Stakhanova, Paul Cook, Alina Matyukhina |
Android authorship attribution through string analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 4:1-4:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Krzysztof Cabaj, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski |
Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 12:1-12:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Masoomeh Sepehri, Alberto Trombetta, Maryam Sepehri, Ernesto Damiani |
An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 12:1-12:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chibuike Ugwuoke, Zekeriya Erkin, Reginald L. Lagendijk |
Secure Fixed-point Division for Homomorphically Encrypted Operands. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 33:1-33:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yi-Ching Liao |
Investigating the Use of Online Open Source Information as Evidence in European Courts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 52:1-52:6, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Martin Gilje Jaatun |
Software Security Activities that Support Incident Management in Secure DevOps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 8:1-8:6, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Pawel Rajba |
Challenges and mitigation approaches for getting secured applications in an enterprise company. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 7:1-7:6, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Geisler, Wojciech Mazurczyk, Jörg Keller 0001 |
Towards Utilization of Covert Channels as a Green Networking Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 14:1-14:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko |
Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 62:1-62:8, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Majid Nateghizad, Thijs Veugen, Zekeriya Erkin, Reginald L. Lagendijk |
Secure Equality Testing Protocols in the Two-Party Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 3:1-3:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Arnold Sykosch, Marc Ohm, Michael Meier 0001 |
Hunting Observable Objects for Indication of Compromise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 59:1-59:8, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Olusola Akinrolabu, Ioannis Agrafiotis, Arnau Erola |
The challenge of detecting sophisticated attacks: Insights from SOC Analysts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 55:1-55:9, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Heng Zhang 0009, Jesus Luna, Neeraj Suri, Rubén Trapero |
Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 5:1-5:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Pastor 0001, Alberto Mozo, Diego R. López, Jesús Folgueira, Angeliki Kapodistria |
The Mouseworld, a security traffic analysis lab based on NFV/SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 57:1-57:6, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Anatoli Kalysch, Oskar Milisterfer, Mykolai Protsenko, Tilo Müller |
Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 58:1-58:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Brett Benyo, Shane S. Clark, Aaron Paulos, Partha P. Pal |
HYDRA: Hypothesis Driven Repair Automation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 8:1-8:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Julian Rauchberger, Sebastian Schrittwieser, Tobias Dam, Robert Luh, Damjan Buhov, Gerhard Pötzelsberger, Hyoungshick Kim |
The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 18:1-18:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Marek Pawlicki, Michal Choras, Rafal Kozik |
Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 61:1-61:6, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet, Francesco Mercaldo |
Detection of Obfuscation Techniques in Android Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 57:1-57:9, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan |
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 40:1-40:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Václav Jirovský, Andrej Pastorek, Max Mühlhäuser, Andrea Tundis |
Cybercrime and Organized Crime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 61:1-61:5, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Huy H. Nguyen, Ngoc-Dung T. Tieu, Hoang-Quoc Nguyen-Son, Vincent Nozick, Junichi Yamagishi, Isao Echizen |
Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 1:1-1:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Mark Daniels, John R. Rose, Csilla Farkas |
Protecting Patients' Data: An Efficient Method for Health Data Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 9:1-9:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Håkan Jonsson 0002, Carl Magnus Olsson |
User privacy attitudes regarding proximity sensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 25:1-25:5, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Patrício Domingues, Miguel Frade |
Digitally Signed and Permission Restricted PDF Files: a Case Study on Digital Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 51:1-51:8, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Omid Mir, René Mayrhofer, Michael Hölzl, Thanh-Binh Nguyen |
Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 38:1-38:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | I. Adam, J. Ping |
Framework for Security Event Management in 5G. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 51:1-51:7, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Bruno Malveira Peixoto, Sandra Avila, Zanoni Dias, Anderson Rocha 0001 |
Breaking down violence: A deep-learning strategy to model and classify violence in videos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 50:1-50:7, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Christos M. Mathas, Olga E. Segou, Georgios Xilouris, Dimitris Christinakis, Michail-Alexandros Kourtis, Costas Vassilakis, Anastasios Kourtis |
Evaluation of Apache Spot's machine learning capabilities in an SDN/NFV enabled environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 52:1-52:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jonas Walter, Bettina Abendroth, Thilo Von Pape, Christian Plappert, Daniel Zelle, Christoph Krauß, G. Gagzow, Hendrik Decke |
The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 24:1-24:10, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Tanveer A. Zia, Peng Liu 0005, Weili Han |
Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 55:1-55:7, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone |
Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 76:1-76:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Martin Gilje Jaatun, Daniela S. Cruzes, Jesus Luna |
DevOps for Better Software Security in the Cloud Invited Paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 69:1-69:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Elike Hodo, Xavier J. A. Bellekens, Ephraim Iorkyase, Andrew W. Hamilton, Christos Tachtatzis, Robert C. Atkinson |
Machine Learning Approach for Detection of nonTor Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 85:1-85:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tom Arjannikov, Simon Diemert, Sudhakar Ganti, Chloe Lampman, Edward C. Wiebe |
Using Markov Chains to Model Sensor Network Reliability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 6:1-6:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Olga Kieselmann, Arno Wacker, Gregor Schiele |
k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 43:1-43:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram |
Provisioning Software with Hardware-Software Binding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 49:1-49:9, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tomás Komárek, Petr Somol |
End-node Fingerprinting for Malware Detection on HTTPS Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 77:1-77:7, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kalle Rindell, Sami Hyrynsalmi, Ville Leppänen |
Busting a Myth: Review of Agile Security Engineering Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 74:1-74:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nikolaos P. Karvelas, Marius Senftleben, Stefan Katzenbeisser 0001 |
Microblogging in a Privacy-Preserving way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 48:1-48:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jasper Abbink, Christian Doerr |
Popularity-based Detection of Domain Generation Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 79:1-79:8, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Felix Schuckert, Basel Katt, Hanno Langweg |
Source Code Patterns of SQL Injection Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 72:1-72:7, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Tundis, Rolf Egert, Max Mühlhäuser |
Attack Scenario Modeling for Smart Grids Assessment through Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 13:1-13:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Zelle, Christoph Krauß, Hubert Strauß, Karsten Schmidt 0003 |
On Using TLS to Secure In-Vehicle Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 67:1-67:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger |
Memory carving can finally unveil your embedded personal data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 18:1-18:9, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan |
A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 62:1-62:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tetsuji Takada |
Authentication Shutter: Alternative Countermeasure against Password Reuse Attack by Availability Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 41:1-41:9, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera |
Overcoming Limits of Blockchain for IoT Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 26:1-26:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Luca Allodi, Fabio Massacci |
Attack Potential in Impact and Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 32:1-32:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Michael Rossberg, Markus Theil |
Secure Enrollment of Certificates Using Short PINs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 10:1-10:9, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Paul Grace, Mike Surridge |
Towards a Model of User-centered Privacy Preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 91:1-91:8, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yousra Javed, Mohamed Shehab, Emmanuel Bello-Ogunu |
Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 35:1-35:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Avinash Srinivasan, Hunter Dong, Angelos Stavrou |
FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 82:1-82:8, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Kirchner, Stefan Rosenthaler |
bin2llvm: Analysis of Binary Programs Using LLVM Intermediate Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 45:1-45:7, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Erkuden Rios, Eider Iturbe, Maria Carmen Palacios |
Self-healing Multi-Cloud Application Modelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 93:1-93:9, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Enrico Frumento, Federica Freschi, Davide Andreoletti, Angelo Consoli |
Victim Communication Stack (VCS): A flexible model to select the Human Attack Vector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 50:1-50:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Christian Frøystad, Karin Bernsmed, Per Håkon Meland |
Protecting Future Maritime Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 97:1-97:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sam Procter, Eugene Y. Vasserman, John Hatcliff |
SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 66:1-66:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Abdulrahman Alruban, Nathan L. Clarke, Fudong Li 0001, Steven Furnell |
Insider Misuse Attribution using Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 42:1-42:7, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Thomas Schork, Antonia Schwichtenberg, Spiros Alexakis, George Moldovan |
Application of the holistic Data Privacy and Security Framework PaaSword: A focus on the integration in industrial Pilots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 94:1-94:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Markus Wurzenberger, Florian Skopik, Max Landauer, Philipp Greitbauer, Roman Fiedler, Wolfgang Kastner |
Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 31:1-31:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Iakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes |
Artificial Ambient Environments for Proximity Critical Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 5:1-5:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kubilay Demir 0001, Neeraj Suri |
Towards DDoS Attack Resilient Wide Area Monitoring Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 99:1-99:7, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Christof Fetzer, Giovanni Mazzeo, John Oliver, Luigi Romano, Martijn Verburg |
Integrating Reactive Cloud Applications in SERECA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 39:1-39:8, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Joseph DiVita, Roger A. Hallman |
An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 75:1-75:9, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Norbert Blenn, Vincent Ghiëtte, Christian Doerr |
Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 21:1-21:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Khanh-Huu-The Dam, Tayssir Touili |
Learning Android Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 59:1-59:9, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Felix Mayer, Martin Steinebach |
Forensic Image Inspection Assisted by Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 53:1-53:9, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Harry Halpin |
NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 92:1-92:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Marco Rasori, Pericle Perazzo, Gianluca Dini |
A Low-Cost UAV-Based Secure Location Verification Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 30:1-30:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Olivier Blazy, Emmanuel Conchon, Paul Germouty, Amandine Jambert |
Efficient ID-based Designated Verifier Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 44:1-44:8, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Moataz AbdelKhalek, Ahmed F. Shosha |
JSDES: An Automated De-Obfuscation System for Malicious JavaScript. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 80:1-80:13, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Happe, Florian Wohner, Thomas Lorünser |
The Archistar Secret-Sharing Backup Proxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 88:1-88:8, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![ACM, 978-1-4503-5257-4 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
1 | Abeer Al Jarrah, Mohamed Shehab |
The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 57:1-57:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade 0001 |
Secure Matrix Multiplication with MapReduce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 11:1-11:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Merylin Monaro, Riccardo Spolaor, QianQian Li, Mauro Conti, Luciano Gamberini, Giuseppe Sartori |
Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 60:1-60:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lukas Jäger, Richard Petri 0001, Andreas Fuchs 0002 |
Rolling DICE: Lightweight Remote Attestation for COTS IoT Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 95:1-95:8, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Slaughter, Mark Yampolskiy, Manyalibo Matthews, Wayne E. King, Gabe Guss, Yuval Elovici |
How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 78:1-78:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Masoomeh Sepehri, Alberto Trombetta |
Secure and Efficient Data Sharing with Atribute-based Proxy Re-encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 63:1-63:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Edgar R. Weippl |
Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 33:1-33:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alfredo De Santis, Manuela Flores, Barbara Masucci |
One-Message Unilateral Entity Authentication Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 25:1-25:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Spyros Boukoros, Stefan Katzenbeisser 0001 |
Measuring privacy in high dimensional microdata collections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 15:1-15:8, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Enrico Schiavone, Andrea Ceccarelli, Andrea Bondavalli |
Continuous Biometric Verification for Non-Repudiation of Remote Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 4:1-4:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ayman Youssef, Ahmed F. Shosha |
Quantitave Dynamic Taint Analysis of Privacy Leakage in Android Arabic Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 58:1-58:9, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Václav Stupka, Martin Horák, Martin Husák |
Protection of personal data in security alert sharing platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 65:1-65:8, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Ajmal Azad, Samiran Bag, Feng Hao 0001 |
M2M-REP: Reputation of Machines in the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 28:1-28:7, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Reda Yaich, Nora Cuppens, Frédéric Cuppens |
Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 8:1-8:9, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Konstantinos Angelopoulos, Vasiliki Diamantopoulou, Haralambos Mouratidis, Michalis Pavlidis, Mattia Salnitri, Paolo Giorgini, José Fran. Ruiz |
A Holistic Approach for Privacy Protection in E-Government. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 17:1-17:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nils Löken |
Searchable Encryption with Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 24:1-24:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Brian Pfretzschner, Lotfi Ben Othmane |
Identification of Dependency-based Attacks on Node.js. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 68:1-68:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Meffert, Devon Clark, Ibrahim M. Baggili, Frank Breitinger |
Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 56:1-56:11, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shankar Karuppayah, Leon Böck, Tim Grube, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer 0001 |
SensorBuster: On Identifying Sensor Nodes in P2P Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 34:1-34:6, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hasan Yasar |
Implementing Secure DevOps assessment for highly regulated environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 70:1-70:3, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis P. Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, Felix Hörandner |
Towards the Adoption of Secure Cloud Identity Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 90:1-90:7, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Tundis, Alfredo Garro, Teresa Gallo, Domenico Saccà, Simona Citrigno, Sabrina Graziano, Max Mühlhäuser |
Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 12:1-12:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Natalija Vlajic, Xue Ying Shi, Hamzeh Roumani, Pooria Madani |
Resource Hints in HTML5: A New Pandora's Box of Security Nightmares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 61:1-61:9, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jordi Soria-Comas, Josep Domingo-Ferrer |
A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 3:1-3:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Félix Iglesias, Tanja Zseby |
Are Network Covert Timing Channels Statistical Anomalies? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 81:1-81:9, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|