BibTeX records: Paul Tavolato

download as .bib file

@inproceedings{DBLP:conf/icissp/TavolatoT19,
  author    = {Paul Tavolato and
               Christina Tavolato{-}W{\"{o}}tzl},
  title     = {Analytical Modelling of Cyber-physical Systems},
  booktitle = {Proceedings of the 5th International Conference on Information Systems
               Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
               23-25, 2019.},
  pages     = {685--689},
  year      = {2019},
  crossref  = {DBLP:conf/icissp/2019},
  url       = {https://doi.org/10.5220/0007704706850689},
  doi       = {10.5220/0007704706850689},
  timestamp = {Wed, 05 Jun 2019 13:01:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icissp/TavolatoT19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/EignerKT18,
  author    = {Oliver Eigner and
               Philipp Kreimel and
               Paul Tavolato},
  title     = {Attacks on Industrial Control Systems - Modeling and Anomaly Detection},
  booktitle = {Proceedings of the 4th International Conference on Information Systems
               Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
               January 22-24, 2018.},
  pages     = {581--588},
  year      = {2018},
  crossref  = {DBLP:conf/icissp/2018},
  url       = {https://doi.org/10.5220/0006755405810588},
  doi       = {10.5220/0006755405810588},
  timestamp = {Wed, 11 Apr 2018 15:27:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icissp/EignerKT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KreimelET17,
  author    = {Philipp Kreimel and
               Oliver Eigner and
               Paul Tavolato},
  title     = {Anomaly-Based Detection and Classification of Attacks in Cyber-Physical
               Systems},
  booktitle = {Proceedings of the 12th International Conference on Availability,
               Reliability and Security, Reggio Calabria, Italy, August 29 - September
               01, 2017},
  pages     = {40:1--40:6},
  year      = {2017},
  crossref  = {DBLP:conf/IEEEares/2017},
  url       = {https://doi.org/10.1145/3098954.3103155},
  doi       = {10.1145/3098954.3103155},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/KreimelET17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HodoGRT17,
  author    = {Ersi Hodo and
               Stepan Grebeniuk and
               Henri Ruotsalainen and
               Paul Tavolato},
  title     = {Anomaly Detection for Simulated {IEC-60870-5-104} Trafiic},
  booktitle = {Proceedings of the 12th International Conference on Availability,
               Reliability and Security, Reggio Calabria, Italy, August 29 - September
               01, 2017},
  pages     = {100:1--100:7},
  year      = {2017},
  crossref  = {DBLP:conf/IEEEares/2017},
  url       = {https://doi.org/10.1145/3098954.3103166},
  doi       = {10.1145/3098954.3103166},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/HodoGRT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmt/Schick0TNRTA17,
  author    = {Johannes Schick and
               Markus Wagner and
               Niklas Th{\"{u}}r and
               Christina Niederer and
               Gernot Rottermanner and
               Paul Tavolato and
               Wolfgang Aigner},
  title     = {Rule Creation in a Knowledge-assisted Visual Analytics Prototype for
               Malware Analysis},
  booktitle = {Proceedings of the 10th Forum Media Technology and 3rd All Around
               Audio Symposium, St. P{\"{o}}lten, Austria, November 29-30, 2017.},
  pages     = {116--123},
  year      = {2017},
  crossref  = {DBLP:conf/fmt/2017},
  url       = {http://ceur-ws.org/Vol-2009/fmt-proceedings-2017-paper16.pdf},
  timestamp = {Tue, 28 May 2019 16:23:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fmt/Schick0TNRTA17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/Lang-MuhrST15,
  author    = {Christoph Lang{-}Muhr and
               Matthias Schrattenholzer and
               Paul Tavolato},
  title     = {Multi-Layer Agent-Based Simulation of Network Behaviour in Advanced
               Metering Infrastructures},
  booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
               Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
               Applied Sciences Ingolstadt, Germany},
  year      = {2015},
  crossref  = {DBLP:conf/ics-csr/2015},
  url       = {http://ewic.bcs.org/content/ConWebDoc/55105},
  timestamp = {Thu, 25 Aug 2016 11:36:27 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ics-csr/Lang-MuhrST15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DornhacklKLT14,
  author    = {Hermann Dornhackl and
               Konstantin Kadletz and
               Robert Luh and
               Paul Tavolato},
  title     = {Defining Malicious Behavior},
  booktitle = {Ninth International Conference on Availability, Reliability and Security,
               {ARES} 2014, Fribourg, Switzerland, September 8-12, 2014},
  pages     = {273--278},
  year      = {2014},
  crossref  = {DBLP:conf/IEEEares/2014},
  url       = {https://doi.org/10.1109/ARES.2014.43},
  doi       = {10.1109/ARES.2014.43},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/DornhacklKLT14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sose/DornhacklKLT14,
  author    = {Hermann Dornhackl and
               Konstantin Kadletz and
               Robert Luh and
               Paul Tavolato},
  title     = {Malicious Behavior Patterns},
  booktitle = {8th {IEEE} International Symposium on Service Oriented System Engineering,
               {SOSE} 2014, Oxford, United Kingdom, April 7-11, 2014},
  pages     = {384--389},
  year      = {2014},
  crossref  = {DBLP:conf/sose/2014},
  url       = {https://doi.org/10.1109/SOSE.2014.52},
  doi       = {10.1109/SOSE.2014.52},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sose/DornhacklKLT14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/WagnerARDKLT14,
  author    = {Markus Wagner and
               Wolfgang Aigner and
               Alexander Rind and
               Hermann Dornhackl and
               Konstantin Kadletz and
               Robert Luh and
               Paul Tavolato},
  title     = {Problem characterization and abstraction for visual analytics in behavior-based
               malware pattern analysis},
  booktitle = {Proceedings of the Eleventh Workshop on Visualization for Cyber Security,
               Paris, France, November 10, 2014},
  pages     = {9--16},
  year      = {2014},
  crossref  = {DBLP:conf/vizsec/2014},
  url       = {https://doi.org/10.1145/2671491.2671498},
  doi       = {10.1145/2671491.2671498},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/vizsec/WagnerARDKLT14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/PoiselTT11,
  author    = {Rainer Poisel and
               Simon Tjoa and
               Paul Tavolato},
  title     = {Advanced File Carving Approaches for Multimedia Files},
  journal   = {JoWUA},
  volume    = {2},
  number    = {4},
  pages     = {42--58},
  year      = {2011},
  url       = {https://doi.org/10.22667/JOWUA.2011.12.31.042},
  doi       = {10.22667/JOWUA.2011.12.31.042},
  timestamp = {Thu, 23 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jowua/PoiselTT11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/softerg/TavolatoW89,
  author    = {Paul Tavolato and
               Karl{-}Heinz Weidmann},
  title     = {Theoretische und empirische Untersuchungen der Benutzeroberfl{\"{a}}che
               von zwei CAD-Systemen},
  booktitle = {Software-Ergonomie '89, Aufgabenorientierte Systemgestaltung und Funktionalit{\"{a}}t,
               Gemeinsame Fachtagung des German Chapter of the {ACM} und der Gesellschaft
               f{\"{u}}r Informatik {(GI)} vom 29. bis 31. M{\"{a}}rz 1989,
               Hamburg},
  pages     = {447--456},
  year      = {1989},
  crossref  = {DBLP:conf/softerg/1989},
  url       = {http://dl.mensch-und-computer.de/handle/123456789/1197},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/softerg/TavolatoW89},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ogai/TavolatoH87,
  author    = {Paul Tavolato and
               Werner Horn},
  title     = {Ein Werkzeug zum Wissenserwerb},
  booktitle = {3. {\"{O}}sterreichische Artificial Intelligence-Tagung, Wien,
               22.-25. September 1987},
  pages     = {82--91},
  year      = {1987},
  crossref  = {DBLP:conf/ogai/1987},
  url       = {https://doi.org/10.1007/978-3-642-46620-5\_8},
  doi       = {10.1007/978-3-642-46620-5\_8},
  timestamp = {Sun, 02 Jun 2019 21:15:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ogai/TavolatoH87},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/FoidlHT86,
  author    = {Horst Foidl and
               Kurt Hillebrand and
               Paul Tavolato},
  title     = {Prototyping. Die Methode - das Werkzeug - die Erfahrungen},
  journal   = {Angewandte Informatik},
  volume    = {28},
  number    = {3},
  pages     = {95--100},
  year      = {1986},
  timestamp = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/wi/FoidlHT86},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2019,
  editor    = {Paolo Mori and
               Steven Furnell and
               Olivier Camp},
  title     = {Proceedings of the 5th International Conference on Information Systems
               Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
               23-25, 2019},
  publisher = {SciTePress},
  year      = {2019},
  isbn      = {978-989-758-359-9},
  timestamp = {Wed, 05 Jun 2019 13:01:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icissp/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2018,
  editor    = {Paolo Mori and
               Steven Furnell and
               Olivier Camp},
  title     = {Proceedings of the 4th International Conference on Information Systems
               Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
               January 22-24, 2018},
  publisher = {SciTePress},
  year      = {2018},
  isbn      = {978-989-758-282-0},
  timestamp = {Wed, 11 Apr 2018 15:27:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icissp/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2017,
  title     = {Proceedings of the 12th International Conference on Availability,
               Reliability and Security, Reggio Calabria, Italy, August 29 - September
               01, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3098954},
  isbn      = {978-1-4503-5257-4},
  timestamp = {Wed, 16 Aug 2017 12:42:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fmt/2017,
  editor    = {Wolfgang Aigner and
               Thomas Moser and
               Kerstin Blumenstein and
               Matthias Zeppelzauer and
               Michael Iber and
               Grischa Schmiedl},
  title     = {Proceedings of the 10th Forum Media Technology and 3rd All Around
               Audio Symposium, St. P{\"{o}}lten, Austria, November 29-30, 2017},
  series    = {{CEUR} Workshop Proceedings},
  volume    = {2009},
  publisher = {CEUR-WS.org},
  year      = {2017},
  url       = {http://ceur-ws.org/Vol-2009},
  urn       = {urn:nbn:de:0074-2009-8},
  timestamp = {Tue, 28 May 2019 16:23:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fmt/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ics-csr/2015,
  editor    = {Helge Janicke and
               Kevin I. Jones},
  title     = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
               Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
               Applied Sciences Ingolstadt, Germany},
  series    = {Workshops in Computing},
  publisher = {{BCS}},
  year      = {2015},
  url       = {http://ewic.bcs.org/category/18535},
  timestamp = {Thu, 25 Aug 2016 11:36:27 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ics-csr/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2014,
  title     = {Ninth International Conference on Availability, Reliability and Security,
               {ARES} 2014, Fribourg, Switzerland, September 8-12, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6969844},
  timestamp = {Tue, 16 Jun 2015 21:09:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sose/2014,
  title     = {8th {IEEE} International Symposium on Service Oriented System Engineering,
               {SOSE} 2014, Oxford, United Kingdom, April 7-11, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6825321},
  isbn      = {978-1-4799-3616-8},
  timestamp = {Fri, 26 Jun 2015 14:13:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sose/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2014,
  editor    = {Kirsten Whitley and
               Sophie Engle and
               Lane Harrison and
               Fabian Fischer and
               Nicolas Prigent},
  title     = {Proceedings of the Eleventh Workshop on Visualization for Cyber Security,
               Paris, France, November 10, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2671491},
  isbn      = {978-1-4503-2826-5},
  timestamp = {Wed, 10 Jan 2018 18:06:21 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/vizsec/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/softerg/1989,
  editor    = {Susanne Maa{\ss} and
               Horst Oberquelle},
  title     = {Software-Ergonomie '89, Aufgabenorientierte Systemgestaltung und Funktionalit{\"{a}}t,
               Gemeinsame Fachtagung des German Chapter of the {ACM} und der Gesellschaft
               f{\"{u}}r Informatik {(GI)} vom 29. bis 31. M{\"{a}}rz 1989,
               Hamburg},
  series    = {Berichte des German Chapter of the {ACM}},
  volume    = {32},
  publisher = {Teubner},
  year      = {1989},
  url       = {http://dl.mensch-und-computer.de/handle/123456789/23},
  isbn      = {3-519-02673-2},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/softerg/1989},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ogai/1987,
  editor    = {Ernst Buchberger and
               Johannes Retti},
  title     = {3. {\"{O}}sterreichische Artificial Intelligence-Tagung, Wien,
               22.-25. September 1987},
  series    = {Informatik-Fachberichte},
  volume    = {151},
  publisher = {Springer},
  year      = {1987},
  url       = {https://doi.org/10.1007/978-3-642-46620-5},
  doi       = {10.1007/978-3-642-46620-5},
  timestamp = {Sun, 02 Jun 2019 21:15:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ogai/1987},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics