Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jonathan White
@inproceedings{DBLP:conf/sigcse/MillsWL24, author = {Alan Mills and Jonathan White and Phil Legg}, editor = {Ben Stephenson and Jeffrey A. Stone and Lina Battestilli and Samuel A. Rebelsky and Libby Shoop}, title = {Cyber Funfair: Creating Immersive and Educational Experiences for Teaching Cyber Physical Systems Security}, booktitle = {Proceedings of the 55th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2024, Volume 1, Portland, OR, USA, March 20-23, 2024}, pages = {847--852}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3626252.3630820}, doi = {10.1145/3626252.3630820}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/MillsWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MillsWL23, author = {Alan Mills and Jonathan White and Phil Legg}, title = {Longitudinal risk-based security assessment of docker software container images}, journal = {Comput. Secur.}, volume = {135}, pages = {103478}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103478}, doi = {10.1016/J.COSE.2023.103478}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MillsWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/MarshallTCRRBHH23, author = {Deborah A. Marshall and Toni Tagimacruz and Monica Cepoiu{-}Martin and Jill Robert and Bernice Ring and Michael Burston and Suzanne Higgins and Monica Hess and Jonathan White}, title = {A Simulation Modelling Study of Referral Distribution Policies in a Centralized Intake System for Surgical Consultation}, journal = {J. Medical Syst.}, volume = {47}, number = {1}, pages = {4}, year = {2023}, url = {https://doi.org/10.1007/s10916-022-01897-x}, doi = {10.1007/S10916-022-01897-X}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jms/MarshallTCRRBHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isscc/MungerWSTJSHGBFJWMBOMPHNJ23, author = {Benjamin Munger and Kathy Wilcox and Jeshuah Sniderman and Chuck Tung and Brett Johnson and Russell Schreiber and Carson Henrion and Kevin Gillespie and Tom Burd and Harry R. Fair III and Dave Johnson and Jonathan White and Scott McLelland and Steven Bakke and Javin Olson and Ryan McCracken and Matthew Pickett and Aaron Horiuchi and Hien Nguyen and Tim Jackson}, title = {"Zen 4": The {AMD} 5nm 5.7GHz x86-64 Microprocessor Core}, booktitle = {{IEEE} International Solid- State Circuits Conference, {ISSCC} 2023, San Francisco, CA, USA, February 19-23, 2023}, pages = {38--39}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISSCC42615.2023.10067540}, doi = {10.1109/ISSCC42615.2023.10067540}, timestamp = {Wed, 29 Mar 2023 15:53:39 +0200}, biburl = {https://dblp.org/rec/conf/isscc/MungerWSTJSHGBFJWMBOMPHNJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/MillsWL22, author = {Alan Mills and Jonathan White and Phil Legg}, title = {{OGMA:} Visualisation for Software Container Security Analysis and Automated Remediation}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2022, Rhodes, Greece, July 27-29, 2022}, pages = {76--81}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSR54599.2022.9850335}, doi = {10.1109/CSR54599.2022.9850335}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csr2/MillsWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isscc/BurdLPVMJVYWWLW22, author = {Thomas Burd and Wilson Li and James Pistole and Srividhya Venkataraman and Michael McCabe and Timothy Johnson and James Vinh and Thomas Yiu and Mark Wasio and Hon{-}Hin Wong and Daryl Lieu and Jonathan White and Benjamin Munger and Joshua Lindner and Javin Olson and Steven Bakke and Jeshuah Sniderman and Carson Henrion and Russell Schreiber and Eric Busta and Brett Johnson and Tim Jackson and Aron Miller and Ryan Miller and Matthew Pickett and Aaron Horiuchi and Josef Dvorak and Sabeesh Balagangadharan and Sajeesh Ammikkallingal and Pankaj Kumar}, title = {Zen3: The {AMD} 2\({}^{\mbox{nd}}\)-Generation 7nm x86-64 Microprocessor Core}, booktitle = {{IEEE} International Solid-State Circuits Conference, {ISSCC} 2022, San Francisco, CA, USA, February 20-26, 2022}, pages = {1--3}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISSCC42614.2022.9731678}, doi = {10.1109/ISSCC42614.2022.9731678}, timestamp = {Mon, 21 Mar 2022 13:32:47 +0100}, biburl = {https://dblp.org/rec/conf/isscc/BurdLPVMJVYWWLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ud/MoscaWSC22, author = {Erica Isa Mosca and Jonathan White and Edward Steinfeld and Stefano Capolongo}, editor = {Ilaria Garofolo and Giulia Bencini and Alberto Arenghi}, title = {Designing Hospitals Through the Lens of Universal Design. An Evaluation Tool to Enhance Inclusive Healthcare Facilities}, booktitle = {Transforming our World through Universal Design for Human Development - Proceedings of the Sixth International Conference on Universal Design {(UD} 2022), Brescia, Italy, 7 - 9 September 2022}, series = {Studies in Health Technology and Informatics}, volume = {297}, pages = {331--339}, publisher = {{IOS} Press}, year = {2022}, url = {https://doi.org/10.3233/SHTI220857}, doi = {10.3233/SHTI220857}, timestamp = {Thu, 06 Jul 2023 15:13:33 +0200}, biburl = {https://dblp.org/rec/conf/ud/MoscaWSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ud/WhiteM22, author = {Jonathan White and Erica Isa Mosca}, editor = {Ilaria Garofolo and Giulia Bencini and Alberto Arenghi}, title = {Developing Innovative Solutions for Universal Design in Healthcare and Other Sectors}, booktitle = {Transforming our World through Universal Design for Human Development - Proceedings of the Sixth International Conference on Universal Design {(UD} 2022), Brescia, Italy, 7 - 9 September 2022}, series = {Studies in Health Technology and Informatics}, volume = {297}, pages = {340--347}, publisher = {{IOS} Press}, year = {2022}, url = {https://doi.org/10.3233/SHTI220858}, doi = {10.3233/SHTI220858}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ud/WhiteM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/LeggHSWJ21, author = {Phil Legg and Thomas Higgs and Pennie Spruhan and Jonathan White and Ian Johnson}, title = {"Hacking an IoT Home": New opportunities for cyber security education combining remote learning with cyber-physical systems}, booktitle = {International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021, Dublin, Ireland, June 14-18, 2021}, pages = {1--4}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CyberSA52016.2021.9478251}, doi = {10.1109/CYBERSA52016.2021.9478251}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/LeggHSWJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/WhiteL21, author = {Jonathan White and Phil Legg}, title = {Unsupervised One-Class Learning for Anomaly Detection on Home IoT Network Devices}, booktitle = {International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021, Dublin, Ireland, June 14-18, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CyberSA52016.2021.9478248}, doi = {10.1109/CYBERSA52016.2021.9478248}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/WhiteL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/JinTKHW18, author = {Ge Jin and Manghui Tu and Tae{-}Hoon Kim and Justin Heffron and Jonathan White}, editor = {Tiffany Barnes and Daniel D. Garcia and Elizabeth K. Hawthorne and Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones}, title = {Game based Cybersecurity Training for High School Students}, booktitle = {Proceedings of the 49th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2018, Baltimore, MD, USA, February 21-24, 2018}, pages = {68--73}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3159450.3159591}, doi = {10.1145/3159450.3159591}, timestamp = {Tue, 06 Nov 2018 11:07:13 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/JinTKHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jssc/MungerAABFFJKMM16, author = {Benjamin Munger and David Akeson and Srikanth Arekapudi and Tom Burd and Harry R. Fair III and Jim Farrell and Dave Johnson and Guhan Krishnan and Hugh McIntyre and Edward McLellan and Samuel Naffziger and Russell Schreiber and Sriram Sundaram and Jonathan White and Kathryn Wilcox}, title = {Carrizo: {A} High Performance, Energy Efficient 28 nm {APU}}, journal = {{IEEE} J. Solid State Circuits}, volume = {51}, number = {1}, pages = {105--116}, year = {2016}, url = {https://doi.org/10.1109/JSSC.2015.2464688}, doi = {10.1109/JSSC.2015.2464688}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jssc/MungerAABFFJKMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jssc/WilcoxCFGGHJKMNOPPRW15, author = {Kathryn Wilcox and Robert Cole and Harry R. Fair III and Kevin Gillespie and Aaron Grenat and Carson Henrion and Ravi Jotwani and Stephen Kosonocky and Benjamin Munger and Samuel Naffziger and Robert S. Orefice and Sanjay Pant and Donald A. Priore and Ravinder Rachala and Jonathan White}, title = {Steamroller Module and Adaptive Clocking System in 28 nm {CMOS}}, journal = {{IEEE} J. Solid State Circuits}, volume = {50}, number = {1}, pages = {24--34}, year = {2015}, url = {https://doi.org/10.1109/JSSC.2014.2357428}, doi = {10.1109/JSSC.2014.2357428}, timestamp = {Sun, 30 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jssc/WilcoxCFGGHJKMNOPPRW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isscc/WilcoxAFFJKMMNS15, author = {Kathryn Wilcox and David Akeson and Harry R. Fair III and Jim Farrell and Dave Johnson and Guhan Krishnan and Hugh McIntyre and Edward McLellan and Samuel Naffziger and Russell Schreiber and Sriram Sundaram and Jonathan White}, title = {4.8 {A} 28nm x86 {APU} optimized for power and area efficiency}, booktitle = {2015 {IEEE} International Solid-State Circuits Conference, {ISSCC} 2015, Digest of Technical Papers, San Francisco, CA, USA, February 22-26, 2015}, pages = {1--3}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSCC.2015.7062937}, doi = {10.1109/ISSCC.2015.7062937}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isscc/WilcoxAFFJKMMNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ParkKKWK14, author = {Joon S. Park and Kevin A. Kwiat and Charles A. Kamhoua and Jonathan White and Sookyung Kim}, title = {Trusted Online Social Network {(OSN)} services with optimal data management}, journal = {Comput. Secur.}, volume = {42}, pages = {116--136}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.02.004}, doi = {10.1016/J.COSE.2014.02.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ParkKKWK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/snam/WhitePKK14, author = {Jonathan White and Joon S. Park and Charles A. Kamhoua and Kevin A. Kwiat}, title = {Social network attack simulation with honeytokens}, journal = {Soc. Netw. Anal. Min.}, volume = {4}, number = {1}, pages = {221}, year = {2014}, url = {https://doi.org/10.1007/s13278-014-0221-5}, doi = {10.1007/S13278-014-0221-5}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/snam/WhitePKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isscc/GillespieFHJKOP14, author = {Kevin Gillespie and Harry R. Fair III and Carson Henrion and Ravi Jotwani and Stephen V. Kosonocky and Robert S. Orefice and Donald A. Priore and Jonathan White and Kathryn Wilcox}, title = {5.5 Steamroller: An x86-64 core implemented in 28nm bulk {CMOS}}, booktitle = {2014 {IEEE} International Conference on Solid-State Circuits Conference, {ISSCC} 2014, Digest of Technical Papers, San Francisco, CA, USA, February 9-13, 2014}, pages = {104--105}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSCC.2014.6757357}, doi = {10.1109/ISSCC.2014.6757357}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/isscc/GillespieFHJKOP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/WhitePKK13, author = {Jonathan White and Joon S. Park and Charles A. Kamhoua and Kevin A. Kwiat}, editor = {Jon G. Rokne and Christos Faloutsos}, title = {Game theoretic attack analysis in online social network {(OSN)} services}, booktitle = {Advances in Social Networks Analysis and Mining 2013, {ASONAM} '13, Niagara, ON, Canada - August 25 - 29, 2013}, pages = {1012--1019}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2492517.2500257}, doi = {10.1145/2492517.2500257}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/asunam/WhitePKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/WhiteB11, author = {Jonathan White and Nilanjan Banerjee}, editor = {David B. Johnson and Anurag Kumar}, title = {Mirage: Mitigating illicit inventorying in a {RFID} enabled retail environment}, booktitle = {Third International Conference on Communication Systems and Networks, {COMSNETS} 2011, Bangalore, India, January 4-8, 2011}, pages = {1--9}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/COMSNETS.2011.5716498}, doi = {10.1109/COMSNETS.2011.5716498}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/WhiteB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isscc/FischerABDGHHHJMNVWW11, author = {Tim C. Fischer and Srikanth Arekapudi and Eric Busta and Carl Dietz and Michael Golden and Scott Hilker and Aaron Horiuchi and Kevin A. Hurd and Dave Johnson and Hugh McIntyre and Samuel Naffziger and James Vinh and Jonathan White and Kathryn Wilcox}, title = {Design solutions for the Bulldozer 32nm {SOI} 2-core processor module in an 8-core {CPU}}, booktitle = {{IEEE} International Solid-State Circuits Conference, {ISSCC} 2011, Digest of Technical Papers, San Francisco, CA, USA, 20-24 February, 2011}, pages = {78--80}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISSCC.2011.5746227}, doi = {10.1109/ISSCC.2011.5746227}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isscc/FischerABDGHHHJMNVWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iasc/MulvaneyWH10, author = {David Mulvaney and Jonathan White and Muna Hamdi}, title = {Elevator Dispatching Using Heuristic Search}, journal = {Intell. Autom. Soft Comput.}, volume = {16}, number = {1}, pages = {77--87}, year = {2010}, url = {https://doi.org/10.1080/10798587.2010.10643065}, doi = {10.1080/10798587.2010.10643065}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iasc/MulvaneyWH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/WhiteP10, author = {Jonathan White and Brajendra Panda}, title = {Insider threat discovery using automatic detection of mission critical data based on content}, booktitle = {Sixth International Conference on Information Assurance and Security, {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010}, pages = {56--61}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIAS.2010.5604187}, doi = {10.1109/ISIAS.2010.5604187}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/WhiteP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1006-5502, author = {Jonathan White and Nilanjan Banerjee}, title = {Mirage: Mitigating Illicit Inventorying in a {RFID} Enabled Retail Environment}, journal = {CoRR}, volume = {abs/1006.5502}, year = {2010}, url = {http://arxiv.org/abs/1006.5502}, eprinttype = {arXiv}, eprint = {1006.5502}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1006-5502.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/WhiteP09, author = {Jonathan White and Brajendra Panda}, editor = {Atul Prakash and Indranil Gupta}, title = {Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {208--221}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_16}, doi = {10.1007/978-3-642-10772-6\_16}, timestamp = {Wed, 12 May 2021 16:44:21 +0200}, biburl = {https://dblp.org/rec/conf/iciss/WhiteP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WhiteP09, author = {Jonathan White and Brajendra Panda}, title = {Implementing {PII} honeytokens to mitigate against the threat of malicous insiders}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings}, pages = {233}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ISI.2009.5137315}, doi = {10.1109/ISI.2009.5137315}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/WhiteP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/WhitePYNL09, author = {Jonathan White and Brajendra Panda and Quassai Yassen and Khanh Nguyen and Weihan Li}, editor = {Alfonso Rodr{\'{\i}}guez and Mariemma Inmaculada Yag{\"{u}}e del Valle and Eduardo Fern{\'{a}}ndez{-}Medina}, title = {Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation}, booktitle = {Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, {WOSIS} 2009, In conjunction with {ICEIS} 2009, Milan, Italy, May 2009}, pages = {93--102}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Tue, 03 Dec 2019 11:56:05 +0100}, biburl = {https://dblp.org/rec/conf/sis/WhitePYNL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/SuWBC08, author = {Shu{-}Yi Su and Jonathan White and David J. Balding and Lachlan J. M. Coin}, title = {Inference of haplotypic phase and missing genotypes in polyploid organisms and variable copy number genomic regions}, journal = {{BMC} Bioinform.}, volume = {9}, year = {2008}, url = {https://doi.org/10.1186/1471-2105-9-513}, doi = {10.1186/1471-2105-9-513}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcbi/SuWBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisse/White08, author = {Jonathan White}, editor = {Tarek M. Sobh}, title = {Creating Personally Identifiable Honeytokens}, booktitle = {Innovations and Advances in Computer Sciences and Engineering, Volume {I} of the proceedings of the 2008 International Conference on Systems, Computing Sciences and Software Engineering (SCSS), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, {CISSE} 2008, Bridgeport, Connecticut, {USA}}, pages = {227--232}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-90-481-3658-2\_39}, doi = {10.1007/978-90-481-3658-2\_39}, timestamp = {Fri, 02 Jun 2017 20:48:01 +0200}, biburl = {https://dblp.org/rec/conf/cisse/White08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/WhiteT06, author = {Jonathan White and Dale Thompson}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security}, booktitle = {Proceedings of the 2006 International Conference on Security {\&} Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006}, pages = {91--99}, publisher = {{CSREA} Press}, year = {2006}, timestamp = {Wed, 06 Dec 2006 10:51:51 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/WhiteT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.