Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sin/sin2018.bht:"
@inproceedings{DBLP:conf/sin/Almehmadi18, author = {Abdulaziz Almehmadi}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {{SCADA} Networks Anomaly-based Intrusion Detection System}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {18:1--18:4}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264471}, doi = {10.1145/3264437.3264471}, timestamp = {Thu, 17 Sep 2020 10:44:12 +0200}, biburl = {https://dblp.org/rec/conf/sin/Almehmadi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BaalousP18, author = {Rawan Baalous and Ronald Poet}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {How Dangerous Permissions are Described in Android Apps' Privacy Policies?}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {26:1--26:2}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264477}, doi = {10.1145/3264437.3264477}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BaalousP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BabenkoK18, author = {Ludmila K. Babenko and Alexey Kirillov}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Development of method for malware classification based on statistical methods and an extended set of system calls data}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {8:1--8:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264478}, doi = {10.1145/3264437.3264478}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BabenkoK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BabenkoP18, author = {Liudmila Babenko and Ilya Pisarev}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Distributed E-Voting System Based On Blind Intermediaries Using Homomorphic Encryption}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {6:1--6:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264473}, doi = {10.1145/3264437.3264473}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BabenkoP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BasanMB18, author = {Elena Basan and Oleg B. Makarevich and Alexandr S. Basan}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Development of the Anomaly Detection Method for a Group of Mobile Robots}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {20:1--20:4}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264475}, doi = {10.1145/3264437.3264475}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BasanMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BasanMS18, author = {Elena Basan and Oleg B. Makarevich and Andrew Stepenkin}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Development of the Methodology for Testing the Security of Group Management System for Mobile Robots}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {27:1--27:2}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264482}, doi = {10.1145/3264437.3264482}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BasanMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BelenkoKK18, author = {Viacheslav Belenko and Vasiliy M. Krundyshev and Maxim O. Kalinin}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Synthetic datasets generation for intrusion detection in {VANET}}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {9:1--9:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264479}, doi = {10.1145/3264437.3264479}, timestamp = {Fri, 04 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BelenkoKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Bird18, author = {David Bird}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {A Conceptual Framework To Identify Cyber Risks Associated With The Use Of Public Cloud Computing}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {16:1--16:4}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264466}, doi = {10.1145/3264437.3264466}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/Bird18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BranitskiyK18, author = {Alexander Branitskiy and Igor V. Kotenko}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Software Tool for Testing the Packet Analyzer of Network Attack Detection Systems}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {12:1--12:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264488}, doi = {10.1145/3264437.3264488}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BranitskiyK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BusyginKKZ18, author = {Alexey G. Busygin and Artem S. Konoplev and Maxim O. Kalinin and Dmitry P. Zegzhda}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Floating Genesis Block Enhancement for Blockchain Based Routing Between Connected Vehicles and Software-defined {VANET} Security Services}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {24:1--24:2}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264463}, doi = {10.1145/3264437.3264463}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BusyginKKZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/CapellaPR18, author = {Mar{\'{\i}}a Magdalena Payeras Capell{\`{a}} and Maci{\`{a}} Mut Puigserver and Lloren{\c{c}} Huguet i Rotger}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Anonymity in Secure Access to Integrated Touristic Services Including Payment}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {5:1--5:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264472}, doi = {10.1145/3264437.3264472}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/CapellaPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/CurryD18, author = {John Curry and Nick Drage}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Developments in State Level Cyber Wargaming}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {3:1--3:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264468}, doi = {10.1145/3264437.3264468}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/CurryD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/DaudaMAE18, author = {Ahmed Dauda and Scott Mclean and Abdulaziz Almehmadi and Khalil El{-}Khatib}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Big Data Analytics Architecture for Security Intelligence}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {19:1--19:4}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264474}, doi = {10.1145/3264437.3264474}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/DaudaMAE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/GevorgyanA18, author = {R. A. Gevorgyan and E. S. Abramov}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Detection of packaged and encrypted {PE} files with the use of machine-learning algorithm}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {28:1--28:2}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264481}, doi = {10.1145/3264437.3264481}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/GevorgyanA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ImeriFKAN18, author = {Adnan Imeri and Christophe Feltus and Djamel Khadraoui and Nazim Agoulmine and Damien Nicolas}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Solving the trust issues in the process of transportation of dangerous goods by using blockchain technology}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {25:1--25:2}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264470}, doi = {10.1145/3264437.3264470}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/ImeriFKAN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/IshchukovaASS18, author = {Evgeniya Ishchukova and Maxim Anikeev and Vyacheslav Salmanov and Oksana Shamilyan}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Linear and Differential Analysis of Simplified Kuznyechik Cipher}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {14:1--14:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264490}, doi = {10.1145/3264437.3264490}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/IshchukovaASS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KoivunenRL18, author = {Lauri Koivunen and Sampsa Rauti and Ville Lepp{\"{a}}nen}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Towards Profiling Program Instances in Host-Based Intrusion Detection Systems by Recognizing Software Update Patterns}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {21:1--21:4}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264486}, doi = {10.1145/3264437.3264486}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/KoivunenRL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KotenkoAS18, author = {Igor V. Kotenko and Sergey Ageev and Igor Saenko}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {22:1--22:4}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264487}, doi = {10.1145/3264437.3264487}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/KotenkoAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KumarSB18, author = {Vishnu Kumar and Rajveer Singh Shekhawat and Manoj Kumar Bohra}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Secure Data Aggregation in WSNs: {A} Two Level Framework}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {11:1--11:7}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264485}, doi = {10.1145/3264437.3264485}, timestamp = {Tue, 17 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/KumarSB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/LevonevskiyFAN18, author = {Dmitriy K. Levonevskiy and Ludmila N. Fedorchenko and Irina Afanasieva and Fedor Novikov}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Architecture of the Software System for Adaptive Protection of Network Infrastructure}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {17:1--17:4}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264467}, doi = {10.1145/3264437.3264467}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/LevonevskiyFAN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/MaK18, author = {Yang Ma and Hassan B. Kazemian}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Trapdoor-indistinguishable Secure Channel Free Public Key Encryption with Multi-Keywords Search (Student Contributions)}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {2:1--2:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264465}, doi = {10.1145/3264437.3264465}, timestamp = {Tue, 03 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/MaK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/MaroK18, author = {Ekaterina Maro and Maksim Kovalchuk}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Bypass Biometric Lock Systems With Gelatin Artificial Fingerprint}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {23:1--23:2}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264439}, doi = {10.1145/3264437.3264439}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/MaroK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/OsipyanL18, author = {Valeriy O. Osipyan and Kirill I. Litvinov}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {A mathematical model of the cryptosystem based on the linear Diophantine equation}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {15:1--15:4}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264464}, doi = {10.1145/3264437.3264464}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/OsipyanL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/PareekP18, author = {Gaurav Pareek and B. R. Purushothama}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {10:1--10:7}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264480}, doi = {10.1145/3264437.3264480}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/PareekP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/PechenkinD18, author = {Alexander I. Pechenkin and Roman Demidov}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {13:1--13:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264489}, doi = {10.1145/3264437.3264489}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/PechenkinD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/PismenskyBM18, author = {Maxim Pismensky and Elena Basan and Oleg B. Makarevich}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Development of a Protection System for a Group of Mobile Robots, Taking into Account the Requirements of Foreign and Russian Legislation}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264469}, doi = {10.1145/3264437.3264469}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/PismenskyBM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SemedoMR18, author = {Felisberto Semedo and Naghmeh Moradpoor and Majid Rafiq}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Vulnerability Assessment of Objective Function of {RPL} Protocol for Internet of Things}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {1:1--1:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264438}, doi = {10.1145/3264437.3264438}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/SemedoMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ZegzhdaZPI18, author = {Peter D. Zegzhda and Dmitry P. Zegzhda and Evgeny Pavlenko and Gleb Ignatev}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Applying deep learning techniques for Android malware detection}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {7:1--7:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264476}, doi = {10.1145/3264437.3264476}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/ZegzhdaZPI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sin/2018, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, publisher = {{ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3264437}, isbn = {978-1-4503-6608-3}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.