BibTeX records: Holger Jaenisch

download as .bib file

@inproceedings{DBLP:conf/asunam/NunesBSLBTJ15,
  author       = {Eric Nunes and
                  Casey Buto and
                  Paulo Shakarian and
                  Christian Lebiere and
                  Stefano Bennati and
                  Robert Thomson and
                  Holger Jaenisch},
  editor       = {Jian Pei and
                  Fabrizio Silvestri and
                  Jie Tang},
  title        = {Malware Task Identification: {A} Data Driven Approach},
  booktitle    = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
                  in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
                  August 25 - 28, 2015},
  pages        = {978--985},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808797.2808894},
  doi          = {10.1145/2808797.2808894},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/NunesBSLBTJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NunesBSLBTJ15,
  author       = {Eric Nunes and
                  Casey Buto and
                  Paulo Shakarian and
                  Christian Lebiere and
                  Stefano Bennati and
                  Robert Thomson and
                  Holger Jaenisch},
  title        = {Malware Task Identification: {A} Data Driven Approach},
  journal      = {CoRR},
  volume       = {abs/1507.01930},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.01930},
  eprinttype    = {arXiv},
  eprint       = {1507.01930},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NunesBSLBTJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/JaenischHAWBCMA09,
  author       = {Holger Jaenisch and
                  James W. Handley and
                  Nathaniel Albritton and
                  David Whitener and
                  Randel Burnett and
                  Robert Caspers and
                  Stephen Moren and
                  Thomas Alexander and
                  William Maddox III and
                  William Albritton Jr.},
  editor       = {Belur V. Dasarathy},
  title        = {Autonomous journaling response using data model {LUTS}},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {734409},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.817863},
  doi          = {10.1117/12.817863},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/JaenischHAWBCMA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/JaenischHBEGFL06,
  author       = {Holger Jaenisch and
                  James W. Handley and
                  Marvin H. Barnett and
                  Richard Esslinger and
                  David A. Grover and
                  Jeffrey P. Faucheux and
                  Kenneth Lamkin},
  editor       = {Belur V. Dasarathy},
  title        = {Data modeling for predictive behavior hypothesis formation and testing},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410P},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.666411},
  doi          = {10.1117/12.666411},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/JaenischHBEGFL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/JaenischHFL05,
  author       = {Holger Jaenisch and
                  James W. Handley and
                  Jeffrey P. Faucheux and
                  Ken Lamkin},
  editor       = {Belur V. Dasarathy},
  title        = {Shai-Hulud: The quest for worm sign},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {321--329},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603367},
  doi          = {10.1117/12.603367},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/JaenischHFL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spieVIP/JaenischH05,
  author       = {Holger Jaenisch and
                  James W. Handley},
  editor       = {Zia{-}ur Rahman and
                  Robert A. Schowengerdt and
                  Stephen E. Reichenbach},
  title        = {Data modeling augmentation of {JPEG} for real-time streaming video},
  booktitle    = {Visual Information Processing XIV, Orlando, Florida, USA, March 28,
                  2005},
  series       = {{SPIE} Proceedings},
  volume       = {5817},
  pages        = {258--269},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603415},
  doi          = {10.1117/12.603415},
  timestamp    = {Fri, 06 May 2022 13:45:23 +0200},
  biburl       = {https://dblp.org/rec/conf/spieVIP/JaenischH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simulation/HandleyJBRC93,
  author       = {James W. Handley and
                  Holger Jaenisch and
                  C. A. Bjork and
                  L. T. Richardson and
                  R. T. Carruth},
  title        = {Chaos and Fractal Algorithms Applied to Signal Processing and Analysis},
  journal      = {Simul.},
  volume       = {60},
  number       = {1},
  pages        = {36--53},
  year         = {1993},
  url          = {https://doi.org/10.1177/003754979306000104},
  doi          = {10.1177/003754979306000104},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simulation/HandleyJBRC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simulation/HandleyJC93,
  author       = {James W. Handley and
                  Holger Jaenisch and
                  R. T. Carruth},
  title        = {Chaos and Fractal Algorithms Applied to Signal Processing and Analysis},
  journal      = {Simul.},
  volume       = {60},
  number       = {4},
  pages        = {261--278},
  year         = {1993},
  url          = {https://doi.org/10.1177/003754979306000407},
  doi          = {10.1177/003754979306000407},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simulation/HandleyJC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics