BibTeX records: Yinzhi Cao

download as .bib file

@inproceedings{DBLP:conf/ccs/CaoCLW17,
  author    = {Yinzhi Cao and
               Zhanhao Chen and
               Song Li and
               Shujiang Wu},
  title     = {Deterministic Browser},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {163--178},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017},
  url       = {http://doi.acm.org/10.1145/3133956.3133996},
  doi       = {10.1145/3133956.3133996},
  timestamp = {Sat, 28 Oct 2017 18:37:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/CaoCLW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sosp/PeiCYJ17,
  author    = {Kexin Pei and
               Yinzhi Cao and
               Junfeng Yang and
               Suman Jana},
  title     = {DeepXplore: Automated Whitebox Testing of Deep Learning Systems},
  booktitle = {Proceedings of the 26th Symposium on Operating Systems Principles,
               Shanghai, China, October 28-31, 2017},
  pages     = {1--18},
  year      = {2017},
  crossref  = {DBLP:conf/sosp/2017},
  url       = {http://doi.acm.org/10.1145/3132747.3132785},
  doi       = {10.1145/3132747.3132785},
  timestamp = {Thu, 19 Oct 2017 21:45:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sosp/PeiCYJ17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/PeiCYJ17,
  author    = {Kexin Pei and
               Yinzhi Cao and
               Junfeng Yang and
               Suman Jana},
  title     = {DeepXplore: Automated Whitebox Testing of Deep Learning Systems},
  journal   = {CoRR},
  volume    = {abs/1705.06640},
  year      = {2017},
  url       = {http://arxiv.org/abs/1705.06640},
  archivePrefix = {arXiv},
  eprint    = {1705.06640},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/PeiCYJ17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-06774,
  author    = {Yinzhi Cao and
               Zhanhao Chen and
               Song Li and
               Shujiang Wu},
  title     = {Deterministic Browser},
  journal   = {CoRR},
  volume    = {abs/1708.06774},
  year      = {2017},
  url       = {http://arxiv.org/abs/1708.06774},
  archivePrefix = {arXiv},
  eprint    = {1708.06774},
  timestamp = {Tue, 05 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1708-06774},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PanCLZCZ16,
  author    = {Xiang Pan and
               Yinzhi Cao and
               Shuangping Liu and
               Yu Zhou and
               Yan Chen and
               Tingzhe Zhou},
  title     = {CSPAutoGen: Black-box Enforcement of Content Security Policy upon
               Real-world Websites},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {653--665},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {http://doi.acm.org/10.1145/2976749.2978384},
  doi       = {10.1145/2976749.2978384},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/PanCLZCZ16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cns/CaoPC15,
  author    = {Yinzhi Cao and
               Xiang Pan and
               Yan Chen},
  title     = {SafePay: Protecting against credit card forgery with existing magnetic
               card readers},
  booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
               2015, Florence, Italy, September 28-30, 2015},
  pages     = {164--172},
  year      = {2015},
  crossref  = {DBLP:conf/cns/2015},
  url       = {https://doi.org/10.1109/CNS.2015.7346825},
  doi       = {10.1109/CNS.2015.7346825},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cns/CaoPC15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CaoFBEKVC15,
  author    = {Yinzhi Cao and
               Yanick Fratantonio and
               Antonio Bianchi and
               Manuel Egele and
               Christopher Kruegel and
               Giovanni Vigna and
               Yan Chen},
  title     = {EdgeMiner: Automatically Detecting Implicit Control Flow Transitions
               through the Android Framework},
  booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
               2015, San Diego, California, USA, February 8-11, 2015},
  year      = {2015},
  crossref  = {DBLP:conf/ndss/2015},
  url       = {http://www.internetsociety.org/doc/edgeminer-automatically-detecting-implicit-control-flow-transitions-through-android-framework},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ndss/CaoFBEKVC15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PanCC15,
  author    = {Xiang Pan and
               Yinzhi Cao and
               Yan Chen},
  title     = {I Do Not Know What You Visited Last Summer: Protecting users from
               stateful third-party web tracking with TrackingFree browser},
  booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
               2015, San Diego, California, USA, February 8-11, 2015},
  year      = {2015},
  crossref  = {DBLP:conf/ndss/2015},
  url       = {http://www.internetsociety.org/doc/i-do-not-know-what-you-visited-last-summer-protecting-users-third-party-web-tracking},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ndss/PanCC15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RastogiQMCC15,
  author    = {Vaibhav Rastogi and
               Zhengyang Qu and
               Jedidiah McClurg and
               Yinzhi Cao and
               Yan Chen},
  title     = {Uranine: Real-time Privacy Leakage Monitoring without System Modification
               for Android},
  booktitle = {Security and Privacy in Communication Networks - 11th International
               Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
               Revised Selected Papers},
  pages     = {256--276},
  year      = {2015},
  crossref  = {DBLP:conf/securecomm/2015},
  url       = {https://doi.org/10.1007/978-3-319-28865-9_14},
  doi       = {10.1007/978-3-319-28865-9_14},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/securecomm/RastogiQMCC15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sp/CaoY15,
  author    = {Yinzhi Cao and
               Junfeng Yang},
  title     = {Towards Making Systems Forget with Machine Unlearning},
  booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
               CA, USA, May 17-21, 2015},
  pages     = {463--480},
  year      = {2015},
  crossref  = {DBLP:conf/sp/2015},
  url       = {https://doi.org/10.1109/SP.2015.35},
  doi       = {10.1109/SP.2015.35},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sp/CaoY15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sp/HeRCCVYZ15,
  author    = {Boyuan He and
               Vaibhav Rastogi and
               Yinzhi Cao and
               Yan Chen and
               V. N. Venkatakrishnan and
               Runqing Yang and
               Zhenrui Zhang},
  title     = {Vetting {SSL} Usage in Applications with {SSLINT}},
  booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
               CA, USA, May 17-21, 2015},
  pages     = {519--534},
  year      = {2015},
  crossref  = {DBLP:conf/sp/2015},
  url       = {https://doi.org/10.1109/SP.2015.38},
  doi       = {10.1109/SP.2015.38},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sp/HeRCCVYZ15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CaoPCZ14,
  author    = {Yinzhi Cao and
               Xiang Pan and
               Yan Chen and
               Jianwei Zhuge},
  title     = {JShield: towards real-time and vulnerability-based detection of polluted
               drive-by download attacks},
  booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference,
               {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages     = {466--475},
  year      = {2014},
  crossref  = {DBLP:conf/acsac/2014},
  url       = {http://doi.acm.org/10.1145/2664243.2664256},
  doi       = {10.1145/2664243.2664256},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acsac/CaoPCZ14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/raid/CaoSBKVC14,
  author    = {Yinzhi Cao and
               Yan Shoshitaishvili and
               Kevin Borgolte and
               Christopher Kr{\"{u}}gel and
               Giovanni Vigna and
               Yan Chen},
  title     = {Protecting Web-Based Single Sign-on Protocols against Relying Party
               Impersonation Attacks through a Dedicated Bi-directional Authenticated
               Secure Channel},
  booktitle = {Research in Attacks, Intrusions and Defenses - 17th International
               Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
               Proceedings},
  pages     = {276--298},
  year      = {2014},
  crossref  = {DBLP:conf/raid/2014},
  url       = {https://doi.org/10.1007/978-3-319-11379-1_14},
  doi       = {10.1007/978-3-319-11379-1_14},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/raid/CaoSBKVC14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/CaoYRCG14,
  author    = {Yinzhi Cao and
               Chao Yang and
               Vaibhav Rastogi and
               Yan Chen and
               Guofei Gu},
  title     = {Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation
               of Add-On Cross Site Scripting Attacks},
  booktitle = {International Conference on Security and Privacy in Communication
               Networks - 10th International {ICST} Conference, SecureComm 2014,
               Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
               {I}},
  pages     = {582--601},
  year      = {2014},
  crossref  = {DBLP:conf/securecomm/2014-1},
  url       = {https://doi.org/10.1007/978-3-319-23829-6_45},
  doi       = {10.1007/978-3-319-23829-6_45},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/securecomm/CaoYRCG14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tnsm/ZhaoCCZG13,
  author    = {Yao Zhao and
               Yinzhi Cao and
               Yan Chen and
               Ming Zhang and
               Anup Goyal},
  title     = {Rake: Semantics Assisted Network-Based Tracing Framework},
  journal   = {{IEEE} Trans. Network and Service Management},
  volume    = {10},
  number    = {1},
  pages     = {3--14},
  year      = {2013},
  url       = {https://doi.org/10.1109/TNSM.2012.091912.120224},
  doi       = {10.1109/TNSM.2012.091912.120224},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tnsm/ZhaoCCZG13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dsn/CaoRLCM13,
  author    = {Yinzhi Cao and
               Vaibhav Rastogi and
               Zhichun Li and
               Yan Chen and
               Alexander Moshchuk},
  title     = {Redefining web browser principals with a Configurable Origin Policy},
  booktitle = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
               Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
  pages     = {1--12},
  year      = {2013},
  crossref  = {DBLP:conf/dsn/2013},
  url       = {https://doi.org/10.1109/DSN.2013.6575317},
  doi       = {10.1109/DSN.2013.6575317},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/dsn/CaoRLCM13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LuZWCC13,
  author    = {Xun Lu and
               Jianwei Zhuge and
               Ruoyu Wang and
               Yinzhi Cao and
               Yan Chen},
  title     = {De-obfuscation and Detection of Malicious {PDF} Files with High Accuracy},
  booktitle = {46th Hawaii International Conference on System Sciences, {HICSS} 2013,
               Wailea, HI, USA, January 7-10, 2013},
  pages     = {4890--4899},
  year      = {2013},
  crossref  = {DBLP:conf/hicss/2013},
  url       = {https://doi.org/10.1109/HICSS.2013.166},
  doi       = {10.1109/HICSS.2013.166},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/hicss/LuZWCC13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaoLRCW12,
  author    = {Yinzhi Cao and
               Zhichun Li and
               Vaibhav Rastogi and
               Yan Chen and
               Xitao Wen},
  title     = {Virtual browser: a virtualized browser to sandbox third-party JavaScripts
               with enhanced security},
  booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security,
               {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages     = {8--9},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012asia},
  url       = {http://doi.acm.org/10.1145/2414456.2414460},
  doi       = {10.1145/2414456.2414460},
  timestamp = {Tue, 21 Nov 2017 18:32:22 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/CaoLRCW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CaoYPC12,
  author    = {Yinzhi Cao and
               Vinod Yegneswaran and
               Phillip A. Porras and
               Yan Chen},
  title     = {PathCutter: Severing the Self-Propagation Path of {XSS} JavaScript
               Worms in Social Web Networks},
  booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS}
               2012, San Diego, California, USA, February 5-8, 2012},
  year      = {2012},
  crossref  = {DBLP:conf/ndss/2012},
  url       = {http://www.internetsociety.org/pathcutter-severing-self-propagation-path-xss-javascript-worms-social-web-networks},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ndss/CaoYPC12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaoYPC11,
  author    = {Yinzhi Cao and
               Vinod Yegneswaran and
               Phillip A. Porras and
               Yan Chen},
  title     = {Poster: a path-cutting approach to blocking {XSS} worms in social
               web networks},
  booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages     = {745--748},
  year      = {2011},
  crossref  = {DBLP:conf/ccs/2011},
  url       = {http://doi.acm.org/10.1145/2093476.2093483},
  doi       = {10.1145/2093476.2093483},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/CaoYPC11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/ZhaoCCZG11,
  author    = {Yao Zhao and
               Yinzhi Cao and
               Yan Chen and
               Ming Zhang and
               Anup Goyal},
  title     = {Rake: Semantics assisted network-based tracing framework},
  booktitle = {19th International Workshop on Quality of Service, IWQoS 2011, San
               Jose, California, USA, 6-7 June 2011.},
  pages     = {1--9},
  year      = {2011},
  crossref  = {DBLP:conf/iwqos/2011},
  url       = {https://doi.org/10.1109/IWQOS.2011.5931314},
  doi       = {10.1109/IWQOS.2011.5931314},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwqos/ZhaoCCZG11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiTCRCLS11,
  author    = {Zhichun Li and
               Yi Tang and
               Yinzhi Cao and
               Vaibhav Rastogi and
               Yan Chen and
               Bin Liu and
               Clint Sbisa},
  title     = {WebShield: Enabling Various Web Defense Techniques without Client
               Side Modifications},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
               2011},
  year      = {2011},
  crossref  = {DBLP:conf/ndss/2011},
  url       = {http://www.isoc.org/isoc/conferences/ndss/11/pdf/6_2.pdf},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ndss/LiTCRCLS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaoLRC10,
  author    = {Yinzhi Cao and
               Zhichun Li and
               Vaibhav Rastogi and
               Yan Chen},
  title     = {Virtual browser: a web-level sandbox to secure third-party JavaScript
               without sacrificing functionality},
  booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications
               Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages     = {654--656},
  year      = {2010},
  crossref  = {DBLP:conf/ccs/2010},
  url       = {http://doi.acm.org/10.1145/1866307.1866387},
  doi       = {10.1145/1866307.1866387},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/CaoLRC10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017,
  editor    = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://doi.acm.org/10.1145/3133956},
  doi       = {10.1145/3133956},
  isbn      = {978-1-4503-4946-8},
  timestamp = {Sat, 28 Oct 2017 18:37:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sosp/2017,
  title     = {Proceedings of the 26th Symposium on Operating Systems Principles,
               Shanghai, China, October 28-31, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3132747},
  isbn      = {978-1-4503-5085-3},
  timestamp = {Thu, 19 Oct 2017 21:45:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sosp/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn      = {978-1-4503-4139-4},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cns/2015,
  title     = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
               2015, Florence, Italy, September 28-30, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7336674},
  isbn      = {978-1-4673-7876-5},
  timestamp = {Fri, 11 Dec 2015 15:42:21 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/cns/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ndss/2015,
  title     = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
               2015, San Diego, California, USA, February 8-11, 2015},
  publisher = {The Internet Society},
  year      = {2015},
  url       = {http://www.internetsociety.org/events/ndss-symposium-2015},
  timestamp = {Mon, 04 Jul 2016 12:06:02 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ndss/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2015,
  editor    = {Bhavani M. Thuraisingham and
               XiaoFeng Wang and
               Vinod Yegneswaran},
  title     = {Security and Privacy in Communication Networks - 11th International
               Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
               Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {164},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-28865-9},
  doi       = {10.1007/978-3-319-28865-9},
  isbn      = {978-3-319-28864-2},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/securecomm/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sp/2015,
  title     = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
               CA, USA, May 17-21, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7160813},
  isbn      = {978-1-4673-6949-7},
  timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sp/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acsac/2014,
  editor    = {Charles N. Payne Jr. and
               Adam Hahn and
               Kevin R. B. Butler and
               Micah Sherr},
  title     = {Proceedings of the 30th Annual Computer Security Applications Conference,
               {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2664243},
  isbn      = {978-1-4503-3005-3},
  timestamp = {Sat, 06 Dec 2014 14:20:32 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/acsac/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/raid/2014,
  editor    = {Angelos Stavrou and
               Herbert Bos and
               Georgios Portokalidis},
  title     = {Research in Attacks, Intrusions and Defenses - 17th International
               Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8688},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-11379-1},
  doi       = {10.1007/978-3-319-11379-1},
  isbn      = {978-3-319-11378-4},
  timestamp = {Thu, 15 Jun 2017 21:44:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/raid/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2014-1,
  editor    = {Jing Tian and
               Jiwu Jing and
               Mudhakar Srivatsa},
  title     = {International Conference on Security and Privacy in Communication
               Networks - 10th International {ICST} Conference, SecureComm 2014,
               Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
               {I}},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {152},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-23829-6},
  doi       = {10.1007/978-3-319-23829-6},
  isbn      = {978-3-319-23828-9},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/securecomm/2014-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dsn/2013,
  title     = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
               Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6569391},
  isbn      = {978-1-4673-6471-3},
  timestamp = {Thu, 31 Mar 2016 11:12:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/dsn/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/hicss/2013,
  title     = {46th Hawaii International Conference on System Sciences, {HICSS} 2013,
               Wailea, HI, USA, January 7-10, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6479598},
  isbn      = {978-1-4673-5933-7},
  timestamp = {Tue, 05 Apr 2016 11:46:58 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/hicss/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012asia,
  editor    = {Heung Youl Youm and
               Yoojae Won},
  title     = {7th {ACM} Symposium on Information, Compuer and Communications Security,
               {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2414456},
  isbn      = {978-1-4503-1648-4},
  timestamp = {Tue, 21 Nov 2017 18:32:22 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/2012asia},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ndss/2012,
  title     = {19th Annual Network and Distributed System Security Symposium, {NDSS}
               2012, San Diego, California, USA, February 5-8, 2012},
  publisher = {The Internet Society},
  year      = {2012},
  url       = {http://www.internetsociety.org/events/ndss-symposium-2012},
  timestamp = {Wed, 18 Sep 2013 19:36:26 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ndss/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011,
  editor    = {Yan Chen and
               George Danezis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0948-6},
  timestamp = {Thu, 20 Oct 2011 19:38:59 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwqos/2011,
  title     = {19th International Workshop on Quality of Service, IWQoS 2011, San
               Jose, California, USA, 6-7 June 2011},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5888726},
  isbn      = {978-1-4577-0103-0},
  timestamp = {Thu, 18 Feb 2016 13:59:21 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/iwqos/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ndss/2011,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
               2011},
  publisher = {The Internet Society},
  year      = {2011},
  url       = {http://www.isoc.org/isoc/conferences/ndss/11/},
  timestamp = {Wed, 31 Aug 2011 14:05:35 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ndss/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010,
  editor    = {Ehab Al{-}Shaer and
               Angelos D. Keromytis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 17th {ACM} Conference on Computer and Communications
               Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0245-6},
  timestamp = {Mon, 22 Nov 2010 20:51:09 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier