BibTeX records: James Newsome

download as .bib file

@inproceedings{DBLP:conf/usenix/JansenNW22,
  author       = {Rob Jansen and
                  James Newsome and
                  Ryan Wails},
  editor       = {Jiri Schindler and
                  Noa Zilberman},
  title        = {Co-opting Linux Processes for High-Performance Network Simulation},
  booktitle    = {Proceedings of the 2022 {USENIX} Annual Technical Conference, {USENIX}
                  {ATC} 2022, Carlsbad, CA, USA, July 11-13, 2022},
  pages        = {327--350},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/atc22/presentation/jansen},
  timestamp    = {Tue, 16 Jul 2024 09:12:32 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/JansenNW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/VasudevanMN14,
  author       = {Amit Vasudevan and
                  Jonathan M. McCune and
                  James Newsome},
  title        = {Trustworthy Execution on Mobile Devices},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-8190-4},
  doi          = {10.1007/978-1-4614-8190-4},
  isbn         = {978-1-4614-8189-8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/VasudevanMN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/LiMNPBD14,
  author       = {Yanlin Li and
                  Jonathan M. McCune and
                  James Newsome and
                  Adrian Perrig and
                  Brandon Baker and
                  Will Drewry},
  editor       = {Garth Gibson and
                  Nickolai Zeldovich},
  title        = {MiniBox: {A} Two-Way Sandbox for x86 Native Code},
  booktitle    = {Proceedings of the 2014 {USENIX} Annual Technical Conference, {USENIX}
                  {ATC} 2014, Philadelphia, PA, USA, June 19-20, 2014},
  pages        = {409--420},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/atc14/technical-sessions/presentation/li\_yanlin},
  timestamp    = {Tue, 16 Jul 2024 09:12:32 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/LiMNPBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OwusuGMNPV13,
  author       = {Emmanuel Owusu and
                  Jorge Guajardo and
                  Jonathan M. McCune and
                  James Newsome and
                  Adrian Perrig and
                  Amit Vasudevan},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {{OASIS:} on achieving a sanctuary for integrity and secrecy on untrusted
                  platforms},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516678},
  doi          = {10.1145/2508859.2516678},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/OwusuGMNPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VasudevanCJMND13,
  author       = {Amit Vasudevan and
                  Sagar Chaki and
                  Limin Jia and
                  Jonathan M. McCune and
                  James Newsome and
                  Anupam Datta},
  title        = {Design, Implementation and Verification of an eXtensible and Modular
                  Hypervisor Framework},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {430--444},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.36},
  doi          = {10.1109/SP.2013.36},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/VasudevanCJMND13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ZhaoGPN13,
  author       = {Jun Zhao and
                  Virgil D. Gligor and
                  Adrian Perrig and
                  James Newsome},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {94--114},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_12},
  doi          = {10.1007/978-3-642-41717-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ZhaoGPN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VasudevanMNPD12,
  author       = {Amit Vasudevan and
                  Jonathan M. McCune and
                  James Newsome and
                  Adrian Perrig and
                  Leendert van Doorn},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {{CARMA:} a hardware tamper-resistant isolated execution environment
                  on commodity x86 platforms},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {48--49},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414484},
  doi          = {10.1145/2414456.2414484},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VasudevanMNPD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhouGNM12,
  author       = {Zongwei Zhou and
                  Virgil D. Gligor and
                  James Newsome and
                  Jonathan M. McCune},
  title        = {Building Verifiable Trusted Path on Commodity x86 Computers},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {616--630},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.42},
  doi          = {10.1109/SP.2012.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhouGNM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/VasudevanOZNM12,
  author       = {Amit Vasudevan and
                  Emmanuel Owusu and
                  Zongwei Zhou and
                  James Newsome and
                  Jonathan M. McCune},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Trustworthy Execution on Mobile Devices: What Security Properties
                  Can My Mobile Platform Give Me?},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {159--178},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_10},
  doi          = {10.1007/978-3-642-30921-2\_10},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/VasudevanOZNM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/KimBNPW11,
  author       = {Tiffany Hyun{-}Jin Kim and
                  Lujo Bauer and
                  James Newsome and
                  Adrian Perrig and
                  Jesse Walker},
  title        = {Access right assignment mechanisms for secure home networks},
  journal      = {J. Commun. Networks},
  volume       = {13},
  number       = {2},
  pages        = {175--186},
  year         = {2011},
  url          = {https://doi.org/10.1109/JCN.2011.6157417},
  doi          = {10.1109/JCN.2011.6157417},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcn/KimBNPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KimBNPW10,
  author       = {Tiffany Hyun{-}Jin Kim and
                  Lujo Bauer and
                  James Newsome and
                  Adrian Perrig and
                  Jesse Walker},
  editor       = {Wietse Z. Venema},
  title        = {Challenges in Access Right Assignment for Secure Home Networks},
  booktitle    = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington,
                  D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/hotsec10/challenges-access-right-assignment-secure-home-networks},
  timestamp    = {Mon, 01 Feb 2021 08:43:16 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KimBNPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/NewsomeMS09,
  author       = {James Newsome and
                  Stephen McCamant and
                  Dawn Song},
  editor       = {Stephen Chong and
                  David A. Naumann},
  title        = {Measuring channel capacity to distinguish undue influence},
  booktitle    = {Proceedings of the 2009 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2009, Dublin, Ireland, 15-21 June, 2009},
  pages        = {73--85},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1554339.1554349},
  doi          = {10.1145/1554339.1554349},
  timestamp    = {Fri, 25 Jun 2021 14:48:54 +0200},
  biburl       = {https://dblp.org/rec/conf/pldi/NewsomeMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BrumleyNSWJ08,
  author       = {David Brumley and
                  James Newsome and
                  Dawn Song and
                  Hao Wang and
                  Somesh Jha},
  title        = {Theory and Techniques for Automatic Generation of Vulnerability-Based
                  Signatures},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {5},
  number       = {4},
  pages        = {224--241},
  year         = {2008},
  url          = {https://doi.org/10.1109/TDSC.2008.55},
  doi          = {10.1109/TDSC.2008.55},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BrumleyNSWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SongBYCJKLNPS08,
  author       = {Dawn Xiaodong Song and
                  David Brumley and
                  Heng Yin and
                  Juan Caballero and
                  Ivan Jager and
                  Min Gyung Kang and
                  Zhenkai Liang and
                  James Newsome and
                  Pongsin Poosankam and
                  Prateek Saxena},
  editor       = {R. Sekar and
                  Arun K. Pujari},
  title        = {BitBlaze: {A} New Approach to Computer Security via Binary Analysis},
  booktitle    = {Information Systems Security, 4th International Conference, {ICISS}
                  2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89862-7\_1},
  doi          = {10.1007/978-3-540-89862-7\_1},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/SongBYCJKLNPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BrumleyHLNSY08,
  author       = {David Brumley and
                  Cody Hartwig and
                  Zhenkai Liang and
                  James Newsome and
                  Dawn Xiaodong Song and
                  Heng Yin},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Automatically Identifying Trigger-based Behavior in Malware},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {65--88},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_4},
  doi          = {10.1007/978-0-387-68768-1\_4},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/BrumleyHLNSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/TucekNLHXBZS07,
  author       = {Joseph A. Tucek and
                  James Newsome and
                  Shan Lu and
                  Chengdu Huang and
                  Spiros Xanthos and
                  David Brumley and
                  Yuanyuan Zhou and
                  Dawn Xiaodong Song},
  editor       = {Paulo Ferreira and
                  Thomas R. Gross and
                  Lu{\'{\i}}s Veiga},
  title        = {Sweeper: a lightweight end-to-end system for defending against fast
                  worms},
  booktitle    = {Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March
                  21-23, 2007},
  pages        = {115--128},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1272996.1273010},
  doi          = {10.1145/1272996.1273010},
  timestamp    = {Thu, 12 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/TucekNLHXBZS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BrumleyCLN07,
  author       = {David Brumley and
                  Juan Caballero and
                  Zhenkai Liang and
                  James Newsome},
  editor       = {Niels Provos},
  title        = {Towards Automatic Discovery of Deviations in Binary Implementations
                  with Applications to Error Detection and Fingerprint Generation},
  booktitle    = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA,
                  August 6-10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/16th-usenix-security-symposium/towards-automatic-discovery-deviations-binary},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BrumleyCLN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BrumleyNS07,
  author       = {David Brumley and
                  James Newsome and
                  Dawn Song},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Sting: An End-to-End Self-Healing System for Defending against Internet
                  Worms},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {147--170},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_7},
  doi          = {10.1007/978-0-387-44599-1\_7},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BrumleyNS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NewsomeBFS06,
  author       = {James Newsome and
                  David Brumley and
                  Jason Franklin and
                  Dawn Xiaodong Song},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Replayer: automatic protocol replay by binary analysis},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {311--321},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180444},
  doi          = {10.1145/1180405.1180444},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NewsomeBFS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NewsomeBSCK06,
  author       = {James Newsome and
                  David Brumley and
                  Dawn Xiaodong Song},
  title        = {Vulnerability-Specific Execution Filtering for Exploit Prevention
                  on Commodity Software},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2006, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2006},
  url          = {https://www.ndss-symposium.org/ndss2006/vulnerability-specific-execution-filtering-exploit-prevention-commodity-software/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/NewsomeBSCK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NewsomeKS06,
  author       = {James Newsome and
                  Brad Karp and
                  Dawn Xiaodong Song},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Paragraph: Thwarting Signature Learning by Training Maliciously},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {81--105},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_5},
  doi          = {10.1007/11856214\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NewsomeKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BrumleyNSWJ06,
  author       = {David Brumley and
                  James Newsome and
                  Dawn Xiaodong Song and
                  Hao Wang and
                  Somesh Jha},
  title        = {Towards Automatic Generation of Vulnerability-Based Signatures},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {2--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.41},
  doi          = {10.1109/SP.2006.41},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BrumleyNSWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NewsomeS05,
  author       = {James Newsome and
                  Dawn Xiaodong Song},
  title        = {Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration
                  of Exploits on Commodity Software},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2005, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2005},
  url          = {https://www.ndss-symposium.org/ndss2005/dynamic-taint-analysis-automatic-detection-analysis-and-signaturegeneration-exploits-commodity/},
  timestamp    = {Mon, 01 Feb 2021 08:42:12 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/NewsomeS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NewsomeKS05,
  author       = {James Newsome and
                  Brad Karp and
                  Dawn Xiaodong Song},
  title        = {Polygraph: Automatically Generating Signatures for Polymorphic Worms},
  booktitle    = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
                  May 2005, Oakland, CA, {USA}},
  pages        = {226--241},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SP.2005.15},
  doi          = {10.1109/SP.2005.15},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/NewsomeKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipsn/NewsomeSSP04,
  author       = {James Newsome and
                  Elaine Shi and
                  Dawn Xiaodong Song and
                  Adrian Perrig},
  editor       = {Kannan Ramchandran and
                  Janos Sztipanovits and
                  Jennifer C. Hou and
                  Thrasyvoulos N. Pappas},
  title        = {The sybil attack in sensor networks: analysis {\&} defenses},
  booktitle    = {Proceedings of the Third International Symposium on Information Processing
                  in Sensor Networks, {IPSN} 2004, Berkeley, California, USA, April
                  26-27, 2004},
  pages        = {259--268},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/984622.984660},
  doi          = {10.1145/984622.984660},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/ipsn/NewsomeSSP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/NewsomeS03,
  author       = {James Newsome and
                  Dawn Xiaodong Song},
  editor       = {Ian F. Akyildiz and
                  Deborah Estrin and
                  David E. Culler and
                  Mani B. Srivastava},
  title        = {{GEM:} graph eMbedding for routing and data-centric storage in sensor
                  networks without geographic information},
  booktitle    = {Proceedings of the 1st International Conference on Embedded Networked
                  Sensor Systems, SenSys 2003, Los Angeles, California, USA, November
                  5-7, 2003},
  pages        = {76--88},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/958491.958501},
  doi          = {10.1145/958491.958501},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sensys/NewsomeS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}