Search dblp for Publications

export results for "toc:db/journals/sesa/sesa3.bht:"

 download as .bib file

@article{DBLP:journals/sesa/AlmajedMSJZ16,
  author       = {Najlaa Almajed and
                  Leandros A. Maglaras and
                  Fran{\c{c}}ois Siewe and
                  Helge Janicke and
                  Pooneh Bagheri Zadeh},
  title        = {Prevention of crime in {B2C} E-Commerce: How E-Retailers/Banks protect
                  themselves from Criminal Sctivities},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {7},
  pages        = {e4},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.8-12-2016.151727},
  doi          = {10.4108/EAI.8-12-2016.151727},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/AlmajedMSJZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/CaseyMKMM16,
  author       = {William Casey and
                  Parisa Memarmoshrefi and
                  Ansgar Kellner and
                  Jose Andre Morales and
                  Bud Mishra},
  title        = {Identity Deception and Game Deterrence via Signaling Games},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {9},
  pages        = {e3},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.3-12-2015.2262519},
  doi          = {10.4108/EAI.3-12-2015.2262519},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/CaseyMKMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Chatzikonstantinou16,
  author       = {Alexia Chatzikonstantinou and
                  Christoforos Ntantogian and
                  Georgios Karopoulos and
                  Christos Xenakis},
  title        = {Evaluation of Cryptography Usage in Android Applications},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {9},
  pages        = {e4},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.3-12-2015.2262471},
  doi          = {10.4108/EAI.3-12-2015.2262471},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/Chatzikonstantinou16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/CurzonBTC16,
  author       = {Paul Curzon and
                  Ann Blandford and
                  Harold Thimbleby and
                  Anna Louise Cox},
  title        = {Safer Interactive Medical Device Design: Insights from the {CHI+MED}
                  Project},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {9},
  pages        = {e1},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.14-10-2015.2261752},
  doi          = {10.4108/EAI.14-10-2015.2261752},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/CurzonBTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/DurHM16,
  author       = {Umut Mert Dur and
                  Robert Hammond and
                  Thayer Morrill},
  title        = {The Secure Boston Mechanism},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {10},
  pages        = {e5},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.8-8-2015.2260861},
  doi          = {10.4108/EAI.8-8-2015.2260861},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/DurHM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/JanickeJM16,
  author       = {Helge Janicke and
                  Kevin I. Jones and
                  Leandros A. Maglaras},
  title        = {Security, Privacy and Trust in Cyber Physical Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {7},
  pages        = {e1},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.8-12-2016.151724},
  doi          = {10.4108/EAI.8-12-2016.151724},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/JanickeJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/JavaidNSA16,
  author       = {Ahmad Y. Javaid and
                  Quamar Niyaz and
                  Weiqing Sun and
                  Mansoor Alam},
  title        = {A Deep Learning Approach for Network Intrusion Detection System},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {9},
  pages        = {e2},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.3-12-2015.2262516},
  doi          = {10.4108/EAI.3-12-2015.2262516},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/JavaidNSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/KeefeS16,
  author       = {Ken Keefe and
                  William H. Sanders},
  title        = {Reliability Analysis with Dynamic Reliability Block Diagrams in the
                  M{\"{o}}bius Modeling Tool},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {10},
  pages        = {e3},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.14-12-2015.2262723},
  doi          = {10.4108/EAI.14-12-2015.2262723},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/KeefeS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MandalG16,
  author       = {Kalikinkar Mandal and
                  Guang Gong},
  title        = {Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations
                  for Securing {RFID} Applications},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {7},
  pages        = {e3},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.8-12-2016.151726},
  doi          = {10.4108/EAI.8-12-2016.151726},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/MandalG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/NoguchiIY16,
  author       = {Wataru Noguchi and
                  Hiroyuki Iizuka and
                  Masahito Yamamoto},
  title        = {Proposing Multimodal Integration Model Using {LSTM} and Autoencoder},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {10},
  pages        = {e1},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.3-12-2015.2262505},
  doi          = {10.4108/EAI.3-12-2015.2262505},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/NoguchiIY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/RayABG16,
  author       = {Apala Ray and
                  Johan {\AA}kerberg and
                  Mats Bj{\"{o}}rkman and
                  Mikael Gidlund},
  title        = {Assessing Security, Capacity and Reachability of a Heterogeneous Industrial
                  Network during Planning Phase},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {7},
  pages        = {e5},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.8-12-2016.151728},
  doi          = {10.4108/EAI.8-12-2016.151728},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/RayABG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/RossiIM16,
  author       = {Gian{-}Luca Dei Rossi and
                  Mauro Iacono and
                  Andrea Marin},
  title        = {Evaluating the impact of eDoS attacks to cloud facilities},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {10},
  pages        = {e2},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.14-12-2015.2262650},
  doi          = {10.4108/EAI.14-12-2015.2262650},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/RossiIM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Rowe16,
  author       = {Neil C. Rowe},
  title        = {Identifying forensically uninteresting files in a large corpus},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {7},
  pages        = {e2},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.8-12-2016.151725},
  doi          = {10.4108/EAI.8-12-2016.151725},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/Rowe16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhangMAH16,
  author       = {Hang Zhang and
                  Parisa Memarmoshrefi and
                  Fatemeh Ashrafi and
                  Dieter Hogrefe},
  title        = {Investigating the Learning Phase of an Autonomous Authentication in
                  Mobile Ad-hoc Networks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {9},
  pages        = {e5},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.3-12-2015.2262465},
  doi          = {10.4108/EAI.3-12-2015.2262465},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhangMAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhaoK16,
  author       = {Jianing Zhao and
                  Peter Kemper},
  title        = {Protecting Encryption Keys in Mobile Systems Against Memory Errors},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {10},
  pages        = {e4},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.14-12-2015.2262698},
  doi          = {10.4108/EAI.14-12-2015.2262698},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhaoK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/AhmatMB15,
  author       = {Daouda Ahmat and
                  Damien Magoni and
                  Tegawend{\'{e}} F. Bissyand{\'{e}}},
  title        = {End-to-End Key Exchange through Disjoint Paths in {P2P} Networks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {3},
  pages        = {e3},
  year         = {2015},
  url          = {https://doi.org/10.4108/sesa.2.3.e3},
  doi          = {10.4108/SESA.2.3.E3},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/AhmatMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ElashryMS15,
  author       = {Ibrahim F. Elashry and
                  Yi Mu and
                  Willy Susilo},
  title        = {Mediated Encryption: Analysis and Design},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {3},
  pages        = {e2},
  year         = {2015},
  url          = {https://doi.org/10.4108/sesa.2.3.e2},
  doi          = {10.4108/SESA.2.3.E2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ElashryMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/FanMG15,
  author       = {Xinxin Fan and
                  Kalikinkar Mandal and
                  Guang Gong},
  title        = {{WG-8:} {A} Lightweight Stream Cipher for Resource-Constrained Smart
                  Devices},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {3},
  pages        = {e4},
  year         = {2015},
  url          = {https://doi.org/10.4108/sesa.2.3.e4},
  doi          = {10.4108/SESA.2.3.E4},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/FanMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MaglarasJ15,
  author       = {Leandros A. Maglaras and
                  Jianmin Jiang},
  title        = {A novel intrusion detection method based on {OCSVM} and K-means recursive
                  clustering},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {3},
  pages        = {e5},
  year         = {2015},
  url          = {https://doi.org/10.4108/sesa.2.3.e5},
  doi          = {10.4108/SESA.2.3.E5},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/MaglarasJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/StrackxAAP15,
  author       = {Raoul Strackx and
                  Pieter Agten and
                  Niels Avonds and
                  Frank Piessens},
  title        = {Salus: Kernel Support for Secure Process Compartments},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {3},
  pages        = {e1},
  year         = {2015},
  url          = {https://doi.org/10.4108/sesa.2.3.e1},
  doi          = {10.4108/SESA.2.3.E1},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/StrackxAAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics