Search dblp for Publications

export results for "toc:db/conf/sin/sin2018.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sin/Almehmadi18,
  author       = {Abdulaziz Almehmadi},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {{SCADA} Networks Anomaly-based Intrusion Detection System},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {18:1--18:4},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264471},
  doi          = {10.1145/3264437.3264471},
  timestamp    = {Thu, 17 Sep 2020 10:44:12 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/Almehmadi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BaalousP18,
  author       = {Rawan Baalous and
                  Ronald Poet},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {How Dangerous Permissions are Described in Android Apps' Privacy Policies?},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {26:1--26:2},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264477},
  doi          = {10.1145/3264437.3264477},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/BaalousP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BabenkoK18,
  author       = {Ludmila K. Babenko and
                  Alexey Kirillov},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Development of method for malware classification based on statistical
                  methods and an extended set of system calls data},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {8:1--8:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264478},
  doi          = {10.1145/3264437.3264478},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/BabenkoK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BabenkoP18,
  author       = {Liudmila Babenko and
                  Ilya Pisarev},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Distributed E-Voting System Based On Blind Intermediaries Using Homomorphic
                  Encryption},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {6:1--6:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264473},
  doi          = {10.1145/3264437.3264473},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/BabenkoP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BasanMB18,
  author       = {Elena Basan and
                  Oleg B. Makarevich and
                  Alexandr S. Basan},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Development of the Anomaly Detection Method for a Group of Mobile
                  Robots},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {20:1--20:4},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264475},
  doi          = {10.1145/3264437.3264475},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/BasanMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BasanMS18,
  author       = {Elena Basan and
                  Oleg B. Makarevich and
                  Andrew Stepenkin},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Development of the Methodology for Testing the Security of Group Management
                  System for Mobile Robots},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {27:1--27:2},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264482},
  doi          = {10.1145/3264437.3264482},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/BasanMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BelenkoKK18,
  author       = {Viacheslav Belenko and
                  Vasiliy M. Krundyshev and
                  Maxim O. Kalinin},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Synthetic datasets generation for intrusion detection in {VANET}},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {9:1--9:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264479},
  doi          = {10.1145/3264437.3264479},
  timestamp    = {Fri, 04 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/BelenkoKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/Bird18,
  author       = {David Bird},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {A Conceptual Framework To Identify Cyber Risks Associated With The
                  Use Of Public Cloud Computing},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {16:1--16:4},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264466},
  doi          = {10.1145/3264437.3264466},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/Bird18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BranitskiyK18,
  author       = {Alexander Branitskiy and
                  Igor V. Kotenko},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Software Tool for Testing the Packet Analyzer of Network Attack Detection
                  Systems},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {12:1--12:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264488},
  doi          = {10.1145/3264437.3264488},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/BranitskiyK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BusyginKKZ18,
  author       = {Alexey G. Busygin and
                  Artem S. Konoplev and
                  Maxim O. Kalinin and
                  Dmitry P. Zegzhda},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Floating Genesis Block Enhancement for Blockchain Based Routing Between
                  Connected Vehicles and Software-defined {VANET} Security Services},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {24:1--24:2},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264463},
  doi          = {10.1145/3264437.3264463},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/BusyginKKZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/CapellaPR18,
  author       = {Mar{\'{\i}}a Magdalena Payeras Capell{\`{a}} and
                  Maci{\`{a}} Mut Puigserver and
                  Lloren{\c{c}} Huguet i Rotger},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Anonymity in Secure Access to Integrated Touristic Services Including
                  Payment},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264472},
  doi          = {10.1145/3264437.3264472},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/CapellaPR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/CurryD18,
  author       = {John Curry and
                  Nick Drage},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Developments in State Level Cyber Wargaming},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {3:1--3:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264468},
  doi          = {10.1145/3264437.3264468},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/CurryD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/DaudaMAE18,
  author       = {Ahmed Dauda and
                  Scott Mclean and
                  Abdulaziz Almehmadi and
                  Khalil El{-}Khatib},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Big Data Analytics Architecture for Security Intelligence},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {19:1--19:4},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264474},
  doi          = {10.1145/3264437.3264474},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/DaudaMAE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/GevorgyanA18,
  author       = {R. A. Gevorgyan and
                  E. S. Abramov},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Detection of packaged and encrypted {PE} files with the use of machine-learning
                  algorithm},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {28:1--28:2},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264481},
  doi          = {10.1145/3264437.3264481},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/GevorgyanA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ImeriFKAN18,
  author       = {Adnan Imeri and
                  Christophe Feltus and
                  Djamel Khadraoui and
                  Nazim Agoulmine and
                  Damien Nicolas},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Solving the trust issues in the process of transportation of dangerous
                  goods by using blockchain technology},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {25:1--25:2},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264470},
  doi          = {10.1145/3264437.3264470},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/ImeriFKAN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/IshchukovaASS18,
  author       = {Evgeniya Ishchukova and
                  Maxim Anikeev and
                  Vyacheslav Salmanov and
                  Oksana Shamilyan},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Linear and Differential Analysis of Simplified Kuznyechik Cipher},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {14:1--14:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264490},
  doi          = {10.1145/3264437.3264490},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/IshchukovaASS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KoivunenRL18,
  author       = {Lauri Koivunen and
                  Sampsa Rauti and
                  Ville Lepp{\"{a}}nen},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Towards Profiling Program Instances in Host-Based Intrusion Detection
                  Systems by Recognizing Software Update Patterns},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {21:1--21:4},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264486},
  doi          = {10.1145/3264437.3264486},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/KoivunenRL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KotenkoAS18,
  author       = {Igor V. Kotenko and
                  Sergey Ageev and
                  Igor Saenko},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Implementation of Intelligent Agents for Network Traffic and Security
                  Risk Analysis in Cyber-Physical Systems},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {22:1--22:4},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264487},
  doi          = {10.1145/3264437.3264487},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/KotenkoAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KumarSB18,
  author       = {Vishnu Kumar and
                  Rajveer Singh Shekhawat and
                  Manoj Kumar Bohra},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Secure Data Aggregation in WSNs: {A} Two Level Framework},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {11:1--11:7},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264485},
  doi          = {10.1145/3264437.3264485},
  timestamp    = {Tue, 17 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/KumarSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/LevonevskiyFAN18,
  author       = {Dmitriy K. Levonevskiy and
                  Ludmila N. Fedorchenko and
                  Irina Afanasieva and
                  Fedor Novikov},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Architecture of the Software System for Adaptive Protection of Network
                  Infrastructure},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {17:1--17:4},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264467},
  doi          = {10.1145/3264437.3264467},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/LevonevskiyFAN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/MaK18,
  author       = {Yang Ma and
                  Hassan B. Kazemian},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Trapdoor-indistinguishable Secure Channel Free Public Key Encryption
                  with Multi-Keywords Search (Student Contributions)},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {2:1--2:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264465},
  doi          = {10.1145/3264437.3264465},
  timestamp    = {Tue, 03 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/MaK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/MaroK18,
  author       = {Ekaterina Maro and
                  Maksim Kovalchuk},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Bypass Biometric Lock Systems With Gelatin Artificial Fingerprint},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {23:1--23:2},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264439},
  doi          = {10.1145/3264437.3264439},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/MaroK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/OsipyanL18,
  author       = {Valeriy O. Osipyan and
                  Kirill I. Litvinov},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {A mathematical model of the cryptosystem based on the linear Diophantine
                  equation},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {15:1--15:4},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264464},
  doi          = {10.1145/3264437.3264464},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/OsipyanL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/PareekP18,
  author       = {Gaurav Pareek and
                  B. R. Purushothama},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies
                  with Constant Decryption Cost},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {10:1--10:7},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264480},
  doi          = {10.1145/3264437.3264480},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/PareekP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/PechenkinD18,
  author       = {Alexander I. Pechenkin and
                  Roman Demidov},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Applying Deep Learning and Vector Representation for Software Vulnerabilities
                  Detection},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {13:1--13:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264489},
  doi          = {10.1145/3264437.3264489},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/PechenkinD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/PismenskyBM18,
  author       = {Maxim Pismensky and
                  Elena Basan and
                  Oleg B. Makarevich},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Development of a Protection System for a Group of Mobile Robots, Taking
                  into Account the Requirements of Foreign and Russian Legislation},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264469},
  doi          = {10.1145/3264437.3264469},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/PismenskyBM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/SemedoMR18,
  author       = {Felisberto Semedo and
                  Naghmeh Moradpoor and
                  Majid Rafiq},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Vulnerability Assessment of Objective Function of {RPL} Protocol for
                  Internet of Things},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {1:1--1:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264438},
  doi          = {10.1145/3264437.3264438},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/SemedoMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ZegzhdaZPI18,
  author       = {Peter D. Zegzhda and
                  Dmitry P. Zegzhda and
                  Evgeny Pavlenko and
                  Gleb Ignatev},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Applying deep learning techniques for Android malware detection},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {7:1--7:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264476},
  doi          = {10.1145/3264437.3264476},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/ZegzhdaZPI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sin/2018,
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3264437},
  isbn         = {978-1-4503-6608-3},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics