BibTeX records: Chris Novakovic

download as .bib file

@article{DBLP:journals/software/PfefferWFLMRSKK19,
  author       = {Avi Pfeffer and
                  Curt Wu and
                  Gerald Fry and
                  Kenny Lu and
                  Steve Marotta and
                  Michael Reposa and
                  Yuan Shi and
                  T. K. Satish Kumar and
                  Craig A. Knoblock and
                  David Parker and
                  Irfan Muhammad and
                  Chris Novakovic},
  title        = {Software Adaptation for an Unmanned Undersea Vehicle},
  journal      = {{IEEE} Softw.},
  volume       = {36},
  number       = {2},
  pages        = {91--96},
  year         = {2019},
  url          = {https://doi.org/10.1109/MS.2018.2886815},
  doi          = {10.1109/MS.2018.2886815},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/PfefferWFLMRSKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tedu/ChothiaNRT19,
  author       = {Tom Chothia and
                  Chris Novakovic and
                  Andreea{-}Ina Radu and
                  Richard J. Thomas},
  title        = {Choose Your Pwn Adventure: Adding Competition and Storytelling to
                  an Introductory Cybersecurity Course},
  journal      = {Trans. Edutainment},
  volume       = {15},
  pages        = {141--172},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-662-59351-6\_12},
  doi          = {10.1007/978-3-662-59351-6\_12},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tedu/ChothiaNRT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Novakovic019,
  author       = {Chris Novakovic and
                  David Parker},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Automated Formal Analysis of Side-Channel Attacks on Probabilistic
                  Systems},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {319--337},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_16},
  doi          = {10.1007/978-3-030-29959-0\_16},
  timestamp    = {Fri, 07 Aug 2020 17:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Novakovic019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Novakovic15,
  author       = {Christopher Novakovic},
  title        = {Computing and estimating information leakage with a quantitative point-to-point
                  information flow model},
  school       = {University of Birmingham, {UK}},
  year         = {2015},
  url          = {http://etheses.bham.ac.uk/5900/},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Novakovic15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ChothiaNS15,
  author       = {Tom Chothia and
                  Chris Novakovic and
                  Rajiv Ranjan Singh},
  title        = {Calculating Quantitative Integrity and Secrecy for Imperative Programs},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {6},
  number       = {2},
  pages        = {23--46},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJSSE.2015040102},
  doi          = {10.4018/IJSSE.2015040102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/ChothiaNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/Hothersall-Thomas15,
  author       = {Charlie Hothersall{-}Thomas and
                  Sergio Maffeis and
                  Chris Novakovic},
  editor       = {Michal Young and
                  Tao Xie},
  title        = {BrowserAudit: automated testing of browser security features},
  booktitle    = {Proceedings of the 2015 International Symposium on Software Testing
                  and Analysis, {ISSTA} 2015, Baltimore, MD, USA, July 12-17, 2015},
  pages        = {37--47},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2771783.2771789},
  doi          = {10.1145/2771783.2771789},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/Hothersall-Thomas15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChothiaKN14,
  author       = {Tom Chothia and
                  Yusuke Kawamoto and
                  Chris Novakovic},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {LeakWatch: Estimating Information Leakage from Java Programs},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {219--236},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_13},
  doi          = {10.1007/978-3-319-11212-1\_13},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ChothiaKN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChothiaNS14,
  author       = {Tom Chothia and
                  Chris Novakovic and
                  Rajiv Ranjan Singh},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Emil Lupu and
                  Joachim Posegga and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {Automatically Calculating Quantitative Integrity Measures for Imperative
                  Programs},
  booktitle    = {Data Privacy Management, Autonomous Spontaneous Security, and Security
                  Assurance - 9th International Workshop, {DPM} 2014, 7th International
                  Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
                  Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8872},
  pages        = {250--265},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17016-9\_16},
  doi          = {10.1007/978-3-319-17016-9\_16},
  timestamp    = {Sun, 25 Oct 2020 22:34:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ChothiaNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ChothiaKN13,
  author       = {Tom Chothia and
                  Yusuke Kawamoto and
                  Chris Novakovic},
  editor       = {Natasha Sharygina and
                  Helmut Veith},
  title        = {A Tool for Estimating Information Leakage},
  booktitle    = {Computer Aided Verification - 25th International Conference, {CAV}
                  2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8044},
  pages        = {690--695},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39799-8\_47},
  doi          = {10.1007/978-3-642-39799-8\_47},
  timestamp    = {Wed, 07 Dec 2022 23:12:58 +0100},
  biburl       = {https://dblp.org/rec/conf/cav/ChothiaKN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChothiaKNP13,
  author       = {Tom Chothia and
                  Yusuke Kawamoto and
                  Chris Novakovic and
                  David Parker},
  title        = {Probabilistic Point-to-Point Information Leakage},
  booktitle    = {2013 {IEEE} 26th Computer Security Foundations Symposium, New Orleans,
                  LA, USA, June 26-28, 2013},
  pages        = {193--205},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CSF.2013.20},
  doi          = {10.1109/CSF.2013.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChothiaKNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChothiaCNT12,
  author       = {Tom Chothia and
                  Marco Cova and
                  Chris Novakovic and
                  Camilo Gonz{\'{a}}lez Toro},
  editor       = {Angelos D. Keromytis and
                  Roberto Di Pietro},
  title        = {The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent},
  booktitle    = {Security and Privacy in Communication Networks - 8th International
                  {ICST} Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012.
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {106},
  pages        = {185--202},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36883-7\_12},
  doi          = {10.1007/978-3-642-36883-7\_12},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ChothiaCNT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics