Search dblp for Publications

export results for "toc:db/conf/mmmacns/mmmacns2012.bht:"

 download as .bib file

@inproceedings{DBLP:conf/mmmacns/AvanesovCRT12,
  author       = {Tigran Avanesov and
                  Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Towards the Orchestration of Secured Services under Non-disclosure
                  Policies},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {130--145},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_12},
  doi          = {10.1007/978-3-642-33704-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/AvanesovCRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/CadenheadKKT12,
  author       = {Tyrone Cadenhead and
                  Murat Kantarcioglu and
                  Vaibhav Khadilkar and
                  Bhavani Thuraisingham},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Design and Implementation of a Cloud-Based Assured Information Sharing
                  System},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {36--50},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_4},
  doi          = {10.1007/978-3-642-33704-8\_4},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/CadenheadKKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ChechulinKD12,
  author       = {Andrey Chechulin and
                  Igor V. Kotenko and
                  Vasily Desnitsky},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {An Approach for Network Information Flow Analysis for Systems of Embedded
                  Components},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {146--155},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_13},
  doi          = {10.1007/978-3-642-33704-8\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ChechulinKD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DesharnaisKT12,
  author       = {Jos{\'{e}}e Desharnais and
                  Erwanne P. Kanyabwero and
                  Nadia Tawbi},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Enforcing Information Flow Policies by a Three-Valued Analysis},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {114--129},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_11},
  doi          = {10.1007/978-3-642-33704-8\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DesharnaisKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DesnitskyKC12,
  author       = {Vasily Desnitsky and
                  Igor V. Kotenko and
                  Andrey Chechulin},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Configuration-Based Approach to Embedded Device Security},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {270--285},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_23},
  doi          = {10.1007/978-3-642-33704-8\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DesnitskyKC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DiniMSS12,
  author       = {Gianluca Dini and
                  Fabio Martinelli and
                  Andrea Saracino and
                  Daniele Sgandurra},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {{MADAM:} {A} Multi-level Anomaly Detector for Android Malware},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {240--253},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_21},
  doi          = {10.1007/978-3-642-33704-8\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DiniMSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DolgikhNSB12,
  author       = {Andrey M. Dolgikh and
                  Tomas Nykodym and
                  Victor A. Skormin and
                  Zachary Birnbaum},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Using Behavioral Modeling and Customized Normalcy Profiles as Protection
                  against Targeted Cyber-Attacks},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {191--202},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_17},
  doi          = {10.1007/978-3-642-33704-8\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DolgikhNSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GranadilloDJGA12,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Herv{\'{e}} Debar and
                  Gr{\'{e}}goire Jacob and
                  Chrystel Gaber and
                  Mohammed Achemlal},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Individual Countermeasure Selection Based on the Return On Response
                  Investment Index},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_14},
  doi          = {10.1007/978-3-642-33704-8\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GranadilloDJGA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GrushoGT12,
  author       = {Alexander A. Grusho and
                  Nikolai A. Grusho and
                  Elena E. Timonina},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Alternative Mechanisms for Information Security},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {108--113},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_10},
  doi          = {10.1007/978-3-642-33704-8\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GrushoGT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/JinSK12,
  author       = {Xin Jin and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {{RABAC:} Role-Centric Attribute-Based Access Control},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {84--96},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_8},
  doi          = {10.1007/978-3-642-33704-8\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/JinSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KerriganC12,
  author       = {Brendan Kerrigan and
                  Yu Chen},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Study of Entropy Sources in Cloud Computers: Random Number Generation
                  on Cloud Hosts},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {286--298},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_24},
  doi          = {10.1007/978-3-642-33704-8\_24},
  timestamp    = {Thu, 10 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KerriganC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KomashinskiyK12,
  author       = {Dmitriy Komashinskiy and
                  Igor V. Kotenko},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Using Low-Level Dynamic Attributes for Malware Detection Based on
                  Data Mining Methods},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {254--269},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_22},
  doi          = {10.1007/978-3-642-33704-8\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KomashinskiyK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Livshits12,
  author       = {Benjamin Livshits},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Finding Malware on a Web Scale},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_1},
  doi          = {10.1007/978-3-642-33704-8\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Livshits12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MartinelliMM12,
  author       = {Fabio Martinelli and
                  Ilaria Matteucci and
                  Charles Morisset},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {From Qualitative to Quantitative Enforcement of Security Policy},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {22--35},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_3},
  doi          = {10.1007/978-3-642-33704-8\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MartinelliMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MoldovyanMN12,
  author       = {Alexander A. Moldovyan and
                  Nikolay A. Moldovyan and
                  Evgenia Novikova},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Blind 384-bit Digital Signature Scheme},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {77--83},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_7},
  doi          = {10.1007/978-3-642-33704-8\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MoldovyanMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MustaphaDJ12,
  author       = {Yosra Ben Mustapha and
                  Herv{\'{e}} Debar and
                  Gr{\'{e}}goire Jacob},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {203--217},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_18},
  doi          = {10.1007/978-3-642-33704-8\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MustaphaDJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Oleshchuk12,
  author       = {Vladimir A. Oleshchuk},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Trust-Aware {RBAC}},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {97--107},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_9},
  doi          = {10.1007/978-3-642-33704-8\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Oleshchuk12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/RiekeCHPG12,
  author       = {Roland Rieke and
                  Luigi Coppolino and
                  Andrew Hutchison and
                  Elsa Prieto and
                  Chrystel Gaber},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Security and Reliability Requirements for Advanced Security Event
                  Management},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {171--180},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_15},
  doi          = {10.1007/978-3-642-33704-8\_15},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/RiekeCHPG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SchutteRW12,
  author       = {Julian Sch{\"{u}}tte and
                  Roland Rieke and
                  Timo Winkelvos},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Model-Based Security Event Management},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {181--190},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_16},
  doi          = {10.1007/978-3-642-33704-8\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SchutteRW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/TsayM12,
  author       = {Joe{-}Kai Tsay and
                  Stig Fr. Mj{\o}lsnes},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Vulnerability in the {UMTS} and {LTE} Authentication and Key Agreement
                  Protocols},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {65--76},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_6},
  doi          = {10.1007/978-3-642-33704-8\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/TsayM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/WangJMS12,
  author       = {Zhaohui Wang and
                  Ryan Johnson and
                  Rahul Murmuria and
                  Angelos Stavrou},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Exposing Security Risks for Commercial Mobile Devices},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_2},
  doi          = {10.1007/978-3-642-33704-8\_2},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/WangJMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/YakovlevKBM12,
  author       = {Viktor Yakovlev and
                  Valery I. Korzhik and
                  Mihail Bakaev and
                  Guillermo Morales{-}Luna},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Optimization of Key Distribution Protocols Based on Extractors for
                  Noisy Channels within Active Adversaries},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {51--64},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_5},
  doi          = {10.1007/978-3-642-33704-8\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/YakovlevKBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/YavvariTRS12,
  author       = {Chaitanya Yavvari and
                  Arnur G. Tokhtabayev and
                  Huzefa Rangwala and
                  Angelos Stavrou},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Malware Characterization Using Behavioral Components},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {226--239},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_20},
  doi          = {10.1007/978-3-642-33704-8\_20},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/YavvariTRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZegzhdaS12,
  author       = {Dmitry P. Zegzhda and
                  Tatiana V. Stepanova},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Stochastic Model of Interaction between Botnets and Distributed Computer
                  Defense Systems},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {218--225},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_19},
  doi          = {10.1007/978-3-642-33704-8\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZegzhdaS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZKK12,
  author       = {Peter D. Zegzhda and
                  Dmitry P. Zegzhda and
                  Maxim O. Kalinin and
                  Artem S. Konoplev},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Security Modeling of Grid Systems Using Petri Nets},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {299--308},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_25},
  doi          = {10.1007/978-3-642-33704-8\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZN12,
  author       = {Peter D. Zegzhda and
                  Dmitry P. Zegzhda and
                  Alexey V. Nikolskiy},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Using Graph Theory for Cloud System Security Modeling},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {309--318},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_26},
  doi          = {10.1007/978-3-642-33704-8\_26},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2012,
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8},
  doi          = {10.1007/978-3-642-33704-8},
  isbn         = {978-3-642-33703-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics