Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sin/sin2016.bht:"
@inproceedings{DBLP:conf/sin/AghaeiZ16, author = {Mohammadreza Soltan Aghaei and Elham Zamani}, title = {The Improved Protocols Based on {AODV} in terms of Quality and Security in {MANET} Network}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {133--135}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947638}, doi = {10.1145/2947626.2947638}, timestamp = {Tue, 06 Nov 2018 16:57:57 +0100}, biburl = {https://dblp.org/rec/conf/sin/AghaeiZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AlarmE16, author = {Safwan Alam and Khalil El{-}Khatib}, title = {Phishing Susceptibility Detection through Social Media Analytics}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {61--64}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947637}, doi = {10.1145/2947626.2947637}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AlarmE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AlavalapatiYDY16, author = {Goutham Reddy Alavalapati and Eun{-}Jun Yoon and Ashok Kumar Das and Kee{-}Young Yoo}, title = {An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {145--149}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947650}, doi = {10.1145/2947626.2947650}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/AlavalapatiYDY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BabenkoMA16, author = {Ludmila K. Babenko and Ekaterina Maro and Maxim Anikeev}, title = {Modeling of Algebraic Analysis of {GOST+} Cipher in SageMath}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {100--103}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947656}, doi = {10.1145/2947626.2947656}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BabenkoMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BasanBM16, author = {Alexandr S. Basan and Elena Basan and Oleg B. Makarevich}, title = {Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor Network}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {116--122}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2951954}, doi = {10.1145/2947626.2951954}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BasanBM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BellekensPTIA16, author = {Xavier J. A. Bellekens and Greig Paul and Christos Tachtatzis and James Irvine and Robert C. Atkinson}, title = {Strategies for Protecting Intellectual Property when Using {CUDA} Applications on Graphics Processing Units}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {166--173}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947635}, doi = {10.1145/2947626.2947635}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BellekensPTIA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BenferhatTTB16, author = {Salem Benferhat and Mouslim Tolba and Karim Tabia and Abdelkader Belkhir}, title = {Integrating non elementary actions in access control models}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {28--31}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2951960}, doi = {10.1145/2947626.2951960}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BenferhatTTB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BottazziIR16, author = {Giovanni Bottazzi and Giuseppe F. Italiano and Giuseppe Giulio Rutigliano}, title = {Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {76--80}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947634}, doi = {10.1145/2947626.2947634}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BottazziIR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BouhaddiAR16, author = {Myria Bouhaddi and Kamel Adi and Mohammed Said Radjef}, title = {Evolutionary Game-Based Defense Mechanism in the MANETs}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {88--95}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947646}, doi = {10.1145/2947626.2947646}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BouhaddiAR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BronteSH16, author = {Robert Bronte and Hossain Shahriar and Hisham M. Haddad}, title = {A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {32--39}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2951964}, doi = {10.1145/2947626.2951964}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BronteSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ChauhanS16, author = {Sonam Chauhan and Ajay Sharma}, title = {Fuzzy Commitment Scheme based on Reed Solomon Codes}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {96--99}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947649}, doi = {10.1145/2947626.2947649}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/ChauhanS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ChefranovN16, author = {Alexander G. Chefranov and Amir Narimani}, title = {Participant Authenticating, Error Detecting, and 100{\%} Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {112--115}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2951958}, doi = {10.1145/2947626.2951958}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/ChefranovN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ChernovKZ16, author = {Andrey Yu. Chernov and Artem S. Konoplev and Dmitry P. Zegzhda}, title = {Applying Virtualization Technology for the Construction of Trusted Executable Environment}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {65--66}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947642}, doi = {10.1145/2947626.2947642}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/ChernovKZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/EliseevG16, author = {Vladimir Eliseev and Anastasiya Gurina}, title = {Algorithms for network server anomaly behavior detection without traffic content inspection}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {67--71}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947643}, doi = {10.1145/2947626.2947643}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/EliseevG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ElleuchiCOA16, author = {Manel Elleuchi and Omar Cheikhrouhou and Abdulfattah Mohammad Obeid and Mohamed Abid}, title = {An Efficient Secure scheme for Wireless Sensor Networks}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {129--132}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947636}, doi = {10.1145/2947626.2947636}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/ElleuchiCOA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/HeBG16, author = {Kun He and Christophe Bidan and Ga{\"{e}}tan Le Guelvouit}, title = {Experimentation of Privacy Protection for {JPEG} Contents on Image-Sharing Platforms}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {150--157}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947651}, doi = {10.1145/2947626.2947651}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/HeBG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/HongK16, author = {Yong{-}pyo Hong and Youngjun Kim}, title = {A Study on Unified Security Mechanism and Platform for Centralized Business Contents}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {45--48}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2951955}, doi = {10.1145/2947626.2951955}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/HongK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/HussainSP16, author = {Sardar Hussain and Richard O. Sinnott and Ron Poet}, title = {Security-enabled Enactment of Decentralized Workflows}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {49--56}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2951957}, doi = {10.1145/2947626.2951957}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/HussainSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/IshchukovaBA16, author = {Evgeniya Ishchukova and Ludmila K. Babenko and Maxim Anikeev}, title = {Fast Implementation and Cryptanalysis of {GOST} {R} 34.12-2015 Block Ciphers}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {104--111}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947657}, doi = {10.1145/2947626.2947657}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/IshchukovaBA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Jardi-CedoPCMV16, author = {Roger Jard{\'{\i}}{-}Ced{\'{o}} and Maci{\`{a}} Mut Puigserver and Jordi Castell{\`{a}}{-}Roca and Magdalena Payeras{-}Capell{\`{a}} and Alexandre Viejo}, title = {Privacy-preserving Electronic Road Pricing System for Multifare Low Emission Zones}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {158--165}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947653}, doi = {10.1145/2947626.2947653}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/Jardi-CedoPCMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/JiangBABG16, author = {Hao Jiang and Ahmed Bouabdallah and Amin Aflatoonian and Jean{-}Marie Bonnin and Karine Guillouard}, title = {A Secure Multi-Tenant Framework for {SDN}}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {40--44}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947641}, doi = {10.1145/2947626.2947641}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/JiangBABG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/JouiniR16, author = {Mouna Jouini and Latifa Ben Arfa Rabai}, title = {A Scalable Threats Classification Model in Information Systems}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {141--144}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947630}, doi = {10.1145/2947626.2947630}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/JouiniR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KaurL16, author = {Jagjot Kaur and Dale Lindskog}, title = {An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc Networks}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {124--128}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947633}, doi = {10.1145/2947626.2947633}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/KaurL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Kim16, author = {Hye{-}Young Kim}, title = {A Study of a Smart {IT} Convergence Framework in IoT}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {174--175}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2951961}, doi = {10.1145/2947626.2951961}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Kim16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/MedhioubHK16, author = {Manel Medhioub and Mohamed Hamdi and Tai{-}Hoon Kim}, title = {A New Authentication Scheme for Cloud-based Storage Applications}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {57--60}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2951963}, doi = {10.1145/2947626.2951963}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/MedhioubHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/RaghavendraRB16, author = {Ramachandra Raghavendra and Kiran B. Raja and Christoph Busch}, title = {Impact of Drug Abuse on Face Recognition Systems: {A} Preliminary Study}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {24--27}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947644}, doi = {10.1145/2947626.2947644}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/RaghavendraRB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/RajaRB16, author = {Kiran B. Raja and Ramachandra Raghavendra and Christoph Busch}, title = {Color Adaptive Quantized Patterns for Presentation Attack Detection in Ocular Biometric Systems}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {9--15}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2951959}, doi = {10.1145/2947626.2951959}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/RajaRB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/StokkenesRB16, author = {Martin Stokkenes and Ramachandra Raghavendra and Christoph Busch}, title = {Biometric Authentication Protocols on Smartphones: An Overview}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {136--140}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2951962}, doi = {10.1145/2947626.2951962}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/StokkenesRB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SubramanianHB16, author = {Deepak Subramanian and Guillaume Hiet and Christophe Bidan}, title = {Preventive information flow control through a mechanism of split addresses}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {1--8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947645}, doi = {10.1145/2947626.2947645}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/SubramanianHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/TselykhKPDT16, author = {Alexey A. Tselykh and Margarita Knyazeva and Elena Popkova and Antonina Durfee and Alexander N. Tselykh}, title = {An Attributed Graph Mining Approach to Detect Transfer Pricing Fraud}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {72--75}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947655}, doi = {10.1145/2947626.2947655}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/TselykhKPDT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/VorobievEFFL16, author = {Vladimir I. Vorobiev and Elena L. Evnevich and Roza R. Fatkieva and Ludmila N. Fedorchenko and Dmitriy K. Levonevskiy}, title = {Criteria and Indices of Computer Network Protection}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {176--177}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2951956}, doi = {10.1145/2947626.2951956}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/VorobievEFFL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/YakubAV16, author = {Ussama Yakub and Vijayalakshmi Atluri and Jaideep Vaidya}, title = {Efficient Evaluation of Authorizations for Video Data}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {16--23}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947652}, doi = {10.1145/2947626.2947652}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/YakubAV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ZegzhdaZKPML16, author = {Peter D. Zegzhda and Dmitry P. Zegzhda and Maxim O. Kalinin and Alexander I. Pechenkin and Alexander Minin and Daria S. Lavrova}, title = {Safe Integration of {SIEM} Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {81--87}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947639}, doi = {10.1145/2947626.2947639}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/ZegzhdaZKPML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sin/2016, title = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626}, doi = {10.1145/2947626}, isbn = {978-1-4503-4764-8}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.