Search dblp for Publications

export results for "toc:db/conf/sin/sin2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sin/AghaeiZ16,
  author       = {Mohammadreza Soltan Aghaei and
                  Elham Zamani},
  title        = {The Improved Protocols Based on {AODV} in terms of Quality and Security
                  in {MANET} Network},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {133--135},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947638},
  doi          = {10.1145/2947626.2947638},
  timestamp    = {Tue, 06 Nov 2018 16:57:57 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AghaeiZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AlarmE16,
  author       = {Safwan Alam and
                  Khalil El{-}Khatib},
  title        = {Phishing Susceptibility Detection through Social Media Analytics},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {61--64},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947637},
  doi          = {10.1145/2947626.2947637},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AlarmE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AlavalapatiYDY16,
  author       = {Goutham Reddy Alavalapati and
                  Eun{-}Jun Yoon and
                  Ashok Kumar Das and
                  Kee{-}Young Yoo},
  title        = {An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement
                  Scheme for Session Initiation Protocol},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {145--149},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947650},
  doi          = {10.1145/2947626.2947650},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/AlavalapatiYDY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BabenkoMA16,
  author       = {Ludmila K. Babenko and
                  Ekaterina Maro and
                  Maxim Anikeev},
  title        = {Modeling of Algebraic Analysis of {GOST+} Cipher in SageMath},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {100--103},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947656},
  doi          = {10.1145/2947626.2947656},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/BabenkoMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BasanBM16,
  author       = {Alexandr S. Basan and
                  Elena Basan and
                  Oleg B. Makarevich},
  title        = {Development of the Hierarchal Trust management System for Mobile Cluster-based
                  Wireless Sensor Network},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {116--122},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2951954},
  doi          = {10.1145/2947626.2951954},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/BasanBM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BellekensPTIA16,
  author       = {Xavier J. A. Bellekens and
                  Greig Paul and
                  Christos Tachtatzis and
                  James Irvine and
                  Robert C. Atkinson},
  title        = {Strategies for Protecting Intellectual Property when Using {CUDA}
                  Applications on Graphics Processing Units},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {166--173},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947635},
  doi          = {10.1145/2947626.2947635},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/BellekensPTIA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BenferhatTTB16,
  author       = {Salem Benferhat and
                  Mouslim Tolba and
                  Karim Tabia and
                  Abdelkader Belkhir},
  title        = {Integrating non elementary actions in access control models},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {28--31},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2951960},
  doi          = {10.1145/2947626.2951960},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/BenferhatTTB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BottazziIR16,
  author       = {Giovanni Bottazzi and
                  Giuseppe F. Italiano and
                  Giuseppe Giulio Rutigliano},
  title        = {Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic
                  Detection},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {76--80},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947634},
  doi          = {10.1145/2947626.2947634},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/BottazziIR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BouhaddiAR16,
  author       = {Myria Bouhaddi and
                  Kamel Adi and
                  Mohammed Said Radjef},
  title        = {Evolutionary Game-Based Defense Mechanism in the MANETs},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {88--95},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947646},
  doi          = {10.1145/2947626.2947646},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/BouhaddiAR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BronteSH16,
  author       = {Robert Bronte and
                  Hossain Shahriar and
                  Hisham M. Haddad},
  title        = {A Signature-Based Intrusion Detection System for Web Applications
                  based on Genetic Algorithm},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {32--39},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2951964},
  doi          = {10.1145/2947626.2951964},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/BronteSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ChauhanS16,
  author       = {Sonam Chauhan and
                  Ajay Sharma},
  title        = {Fuzzy Commitment Scheme based on Reed Solomon Codes},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {96--99},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947649},
  doi          = {10.1145/2947626.2947649},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/ChauhanS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ChefranovN16,
  author       = {Alexander G. Chefranov and
                  Amir Narimani},
  title        = {Participant Authenticating, Error Detecting, and 100{\%} Multiple
                  Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {112--115},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2951958},
  doi          = {10.1145/2947626.2951958},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/ChefranovN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ChernovKZ16,
  author       = {Andrey Yu. Chernov and
                  Artem S. Konoplev and
                  Dmitry P. Zegzhda},
  title        = {Applying Virtualization Technology for the Construction of Trusted
                  Executable Environment},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {65--66},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947642},
  doi          = {10.1145/2947626.2947642},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/ChernovKZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/EliseevG16,
  author       = {Vladimir Eliseev and
                  Anastasiya Gurina},
  title        = {Algorithms for network server anomaly behavior detection without traffic
                  content inspection},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {67--71},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947643},
  doi          = {10.1145/2947626.2947643},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/EliseevG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ElleuchiCOA16,
  author       = {Manel Elleuchi and
                  Omar Cheikhrouhou and
                  Abdulfattah Mohammad Obeid and
                  Mohamed Abid},
  title        = {An Efficient Secure scheme for Wireless Sensor Networks},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {129--132},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947636},
  doi          = {10.1145/2947626.2947636},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/ElleuchiCOA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/HeBG16,
  author       = {Kun He and
                  Christophe Bidan and
                  Ga{\"{e}}tan Le Guelvouit},
  title        = {Experimentation of Privacy Protection for {JPEG} Contents on Image-Sharing
                  Platforms},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {150--157},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947651},
  doi          = {10.1145/2947626.2947651},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/HeBG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/HongK16,
  author       = {Yong{-}pyo Hong and
                  Youngjun Kim},
  title        = {A Study on Unified Security Mechanism and Platform for Centralized
                  Business Contents},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {45--48},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2951955},
  doi          = {10.1145/2947626.2951955},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/HongK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/HussainSP16,
  author       = {Sardar Hussain and
                  Richard O. Sinnott and
                  Ron Poet},
  title        = {Security-enabled Enactment of Decentralized Workflows},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {49--56},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2951957},
  doi          = {10.1145/2947626.2951957},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/HussainSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/IshchukovaBA16,
  author       = {Evgeniya Ishchukova and
                  Ludmila K. Babenko and
                  Maxim Anikeev},
  title        = {Fast Implementation and Cryptanalysis of {GOST} {R} 34.12-2015 Block
                  Ciphers},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {104--111},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947657},
  doi          = {10.1145/2947626.2947657},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/IshchukovaBA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/Jardi-CedoPCMV16,
  author       = {Roger Jard{\'{\i}}{-}Ced{\'{o}} and
                  Maci{\`{a}} Mut Puigserver and
                  Jordi Castell{\`{a}}{-}Roca and
                  Magdalena Payeras{-}Capell{\`{a}} and
                  Alexandre Viejo},
  title        = {Privacy-preserving Electronic Road Pricing System for Multifare Low
                  Emission Zones},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {158--165},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947653},
  doi          = {10.1145/2947626.2947653},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/Jardi-CedoPCMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/JiangBABG16,
  author       = {Hao Jiang and
                  Ahmed Bouabdallah and
                  Amin Aflatoonian and
                  Jean{-}Marie Bonnin and
                  Karine Guillouard},
  title        = {A Secure Multi-Tenant Framework for {SDN}},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {40--44},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947641},
  doi          = {10.1145/2947626.2947641},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/JiangBABG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/JouiniR16,
  author       = {Mouna Jouini and
                  Latifa Ben Arfa Rabai},
  title        = {A Scalable Threats Classification Model in Information Systems},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {141--144},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947630},
  doi          = {10.1145/2947626.2947630},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/JouiniR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KaurL16,
  author       = {Jagjot Kaur and
                  Dale Lindskog},
  title        = {An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc Networks},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {124--128},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947633},
  doi          = {10.1145/2947626.2947633},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/KaurL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/Kim16,
  author       = {Hye{-}Young Kim},
  title        = {A Study of a Smart {IT} Convergence Framework in IoT},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {174--175},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2951961},
  doi          = {10.1145/2947626.2951961},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/Kim16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/MedhioubHK16,
  author       = {Manel Medhioub and
                  Mohamed Hamdi and
                  Tai{-}Hoon Kim},
  title        = {A New Authentication Scheme for Cloud-based Storage Applications},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {57--60},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2951963},
  doi          = {10.1145/2947626.2951963},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/MedhioubHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/RaghavendraRB16,
  author       = {Ramachandra Raghavendra and
                  Kiran B. Raja and
                  Christoph Busch},
  title        = {Impact of Drug Abuse on Face Recognition Systems: {A} Preliminary
                  Study},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {24--27},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947644},
  doi          = {10.1145/2947626.2947644},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/RaghavendraRB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/RajaRB16,
  author       = {Kiran B. Raja and
                  Ramachandra Raghavendra and
                  Christoph Busch},
  title        = {Color Adaptive Quantized Patterns for Presentation Attack Detection
                  in Ocular Biometric Systems},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {9--15},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2951959},
  doi          = {10.1145/2947626.2951959},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/RajaRB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/StokkenesRB16,
  author       = {Martin Stokkenes and
                  Ramachandra Raghavendra and
                  Christoph Busch},
  title        = {Biometric Authentication Protocols on Smartphones: An Overview},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {136--140},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2951962},
  doi          = {10.1145/2947626.2951962},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/StokkenesRB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/SubramanianHB16,
  author       = {Deepak Subramanian and
                  Guillaume Hiet and
                  Christophe Bidan},
  title        = {Preventive information flow control through a mechanism of split addresses},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947645},
  doi          = {10.1145/2947626.2947645},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/SubramanianHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/TselykhKPDT16,
  author       = {Alexey A. Tselykh and
                  Margarita Knyazeva and
                  Elena Popkova and
                  Antonina Durfee and
                  Alexander N. Tselykh},
  title        = {An Attributed Graph Mining Approach to Detect Transfer Pricing Fraud},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {72--75},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947655},
  doi          = {10.1145/2947626.2947655},
  timestamp    = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/TselykhKPDT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/VorobievEFFL16,
  author       = {Vladimir I. Vorobiev and
                  Elena L. Evnevich and
                  Roza R. Fatkieva and
                  Ludmila N. Fedorchenko and
                  Dmitriy K. Levonevskiy},
  title        = {Criteria and Indices of Computer Network Protection},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {176--177},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2951956},
  doi          = {10.1145/2947626.2951956},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/VorobievEFFL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/YakubAV16,
  author       = {Ussama Yakub and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  title        = {Efficient Evaluation of Authorizations for Video Data},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {16--23},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947652},
  doi          = {10.1145/2947626.2947652},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/YakubAV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ZegzhdaZKPML16,
  author       = {Peter D. Zegzhda and
                  Dmitry P. Zegzhda and
                  Maxim O. Kalinin and
                  Alexander I. Pechenkin and
                  Alexander Minin and
                  Daria S. Lavrova},
  title        = {Safe Integration of {SIEM} Systems with Internet of Things: Data Aggregation,
                  Integrity Control, and Bioinspired Safe Routing},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {81--87},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947639},
  doi          = {10.1145/2947626.2947639},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/ZegzhdaZKPML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sin/2016,
  title        = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626},
  doi          = {10.1145/2947626},
  isbn         = {978-1-4503-4764-8},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics