BibTeX records: Seyed Hossein Ahmadinejad

download as .bib file

@inproceedings{DBLP:conf/sacmat/AhmadinejadF17,
  author    = {Seyed Hossein Ahmadinejad and
               Philip W. L. Fong},
  editor    = {Elisa Bertino and
               Ravi Sandhu and
               Edgar R. Weippl},
  title     = {An Enforcement Model for Preventing Inference Attacks in Social Computing
               Platforms},
  booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models
               and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23,
               2017},
  pages     = {55--66},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3078861.3078867},
  doi       = {10.1145/3078861.3078867},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/conf/sacmat/AhmadinejadF17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AhmadinejadFS16,
  author    = {Seyed Hossein Ahmadinejad and
               Philip W. L. Fong and
               Reihaneh Safavi{-}Naini},
  editor    = {Xiaofeng Chen and
               XiaoFeng Wang and
               Xinyi Huang},
  title     = {Privacy and Utility of Inference Control Mechanisms for Social Computing
               Applications},
  booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages     = {829--840},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2897845.2897878},
  doi       = {10.1145/2897845.2897878},
  timestamp = {Tue, 06 Nov 2018 11:07:30 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/AhmadinejadFS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AhmadinejadF14,
  author    = {Seyed Hossein Ahmadinejad and
               Philip W. L. Fong},
  title     = {Unintended disclosure of information: Inference attacks by third-party
               extensions to Social Network Systems},
  journal   = {Comput. Secur.},
  volume    = {44},
  pages     = {75--91},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.cose.2014.04.004},
  doi       = {10.1016/j.cose.2014.04.004},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/AhmadinejadF14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AhmadinejadF13,
  author    = {Seyed Hossein Ahmadinejad and
               Philip W. L. Fong},
  editor    = {Kefei Chen and
               Qi Xie and
               Weidong Qiu and
               Ninghui Li and
               Wen{-}Guey Tzeng},
  title     = {On the feasibility of inference attacks by third-party extensions
               to social network systems},
  booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages     = {161--166},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2484313.2484333},
  doi       = {10.1145/2484313.2484333},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/AhmadinejadF13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AhmadinejadJA11,
  author    = {Seyed Hossein Ahmadinejad and
               Saeed Jalili and
               Mahdi Abadi},
  title     = {A hybrid model for correlating alerts of known and unknown attack
               scenarios and updating attack graphs},
  journal   = {Comput. Networks},
  volume    = {55},
  number    = {9},
  pages     = {2221--2240},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.comnet.2011.03.005},
  doi       = {10.1016/j.comnet.2011.03.005},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/cn/AhmadinejadJA11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/AhmadinejadAF11,
  author    = {Seyed Hossein Ahmadinejad and
               Mohd M. Anwar and
               Philip W. L. Fong},
  title     = {Inference attacks by third-party extensions to social network systems},
  booktitle = {Ninth Annual {IEEE} International Conference on Pervasive Computing
               and Communications, PerCom 2011, 21-25 March 2011, Seattle, WA, USA,
               Workshop Proceedings},
  pages     = {282--287},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {https://doi.org/10.1109/PERCOMW.2011.5766884},
  doi       = {10.1109/PERCOMW.2011.5766884},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/conf/percom/AhmadinejadAF11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/AhmadinejadJ09,
  author    = {Seyed Hossein Ahmadinejad and
               Saeed Jalili},
  editor    = {Dominik Slezak and
               Tai{-}Hoon Kim and
               Wai{-}Chi Fang and
               Kirk P. Arnett},
  title     = {Correlating Alerts into Compressed Graphs Using an Attribute-Based
               Method and Time Windows},
  booktitle = {Security Technology - International Conference, SecTech 2009, Held
               as Part of the Future Generation Information Technology Conference,
               {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings},
  series    = {Communications in Computer and Information Science},
  volume    = {58},
  pages     = {18--25},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10847-1\_3},
  doi       = {10.1007/978-3-642-10847-1\_3},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/fgit/AhmadinejadJ09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics