Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Chris Novakovic
@article{DBLP:journals/software/PfefferWFLMRSKK19, author = {Avi Pfeffer and Curt Wu and Gerald Fry and Kenny Lu and Steve Marotta and Michael Reposa and Yuan Shi and T. K. Satish Kumar and Craig A. Knoblock and David Parker and Irfan Muhammad and Chris Novakovic}, title = {Software Adaptation for an Unmanned Undersea Vehicle}, journal = {{IEEE} Softw.}, volume = {36}, number = {2}, pages = {91--96}, year = {2019}, url = {https://doi.org/10.1109/MS.2018.2886815}, doi = {10.1109/MS.2018.2886815}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/PfefferWFLMRSKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tedu/ChothiaNRT19, author = {Tom Chothia and Chris Novakovic and Andreea{-}Ina Radu and Richard J. Thomas}, title = {Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course}, journal = {Trans. Edutainment}, volume = {15}, pages = {141--172}, year = {2019}, url = {https://doi.org/10.1007/978-3-662-59351-6\_12}, doi = {10.1007/978-3-662-59351-6\_12}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tedu/ChothiaNRT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Novakovic019, author = {Chris Novakovic and David Parker}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {319--337}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_16}, doi = {10.1007/978-3-030-29959-0\_16}, timestamp = {Fri, 07 Aug 2020 17:57:31 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Novakovic019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Novakovic15, author = {Christopher Novakovic}, title = {Computing and estimating information leakage with a quantitative point-to-point information flow model}, school = {University of Birmingham, {UK}}, year = {2015}, url = {http://etheses.bham.ac.uk/5900/}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Novakovic15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ChothiaNS15, author = {Tom Chothia and Chris Novakovic and Rajiv Ranjan Singh}, title = {Calculating Quantitative Integrity and Secrecy for Imperative Programs}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {2}, pages = {23--46}, year = {2015}, url = {https://doi.org/10.4018/IJSSE.2015040102}, doi = {10.4018/IJSSE.2015040102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ChothiaNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/Hothersall-Thomas15, author = {Charlie Hothersall{-}Thomas and Sergio Maffeis and Chris Novakovic}, editor = {Michal Young and Tao Xie}, title = {BrowserAudit: automated testing of browser security features}, booktitle = {Proceedings of the 2015 International Symposium on Software Testing and Analysis, {ISSTA} 2015, Baltimore, MD, USA, July 12-17, 2015}, pages = {37--47}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2771783.2771789}, doi = {10.1145/2771783.2771789}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issta/Hothersall-Thomas15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChothiaKN14, author = {Tom Chothia and Yusuke Kawamoto and Chris Novakovic}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {LeakWatch: Estimating Information Leakage from Java Programs}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {219--236}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_13}, doi = {10.1007/978-3-319-11212-1\_13}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ChothiaKN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChothiaNS14, author = {Tom Chothia and Chris Novakovic and Rajiv Ranjan Singh}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Automatically Calculating Quantitative Integrity Measures for Imperative Programs}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {250--265}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_16}, doi = {10.1007/978-3-319-17016-9\_16}, timestamp = {Sun, 25 Oct 2020 22:34:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ChothiaNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ChothiaKN13, author = {Tom Chothia and Yusuke Kawamoto and Chris Novakovic}, editor = {Natasha Sharygina and Helmut Veith}, title = {A Tool for Estimating Information Leakage}, booktitle = {Computer Aided Verification - 25th International Conference, {CAV} 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8044}, pages = {690--695}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39799-8\_47}, doi = {10.1007/978-3-642-39799-8\_47}, timestamp = {Wed, 07 Dec 2022 23:12:58 +0100}, biburl = {https://dblp.org/rec/conf/cav/ChothiaKN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChothiaKNP13, author = {Tom Chothia and Yusuke Kawamoto and Chris Novakovic and David Parker}, title = {Probabilistic Point-to-Point Information Leakage}, booktitle = {2013 {IEEE} 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013}, pages = {193--205}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CSF.2013.20}, doi = {10.1109/CSF.2013.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChothiaKNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ChothiaCNT12, author = {Tom Chothia and Marco Cova and Chris Novakovic and Camilo Gonz{\'{a}}lez Toro}, editor = {Angelos D. Keromytis and Roberto Di Pietro}, title = {The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent}, booktitle = {Security and Privacy in Communication Networks - 8th International {ICST} Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {106}, pages = {185--202}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36883-7\_12}, doi = {10.1007/978-3-642-36883-7\_12}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ChothiaCNT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.