Search dblp for Publications

export results for "toc:db/conf/IEEEares/ares2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/IEEEares/AbdulrahmanCMM15,
  author       = {Hasan Abdulrahman and
                  Marc Chaumont and
                  Philippe Montesinos and
                  Baptiste Magnier},
  title        = {Color Image Stegananalysis Using Correlations between {RGB} Channels},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {448--454},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.44},
  doi          = {10.1109/ARES.2015.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AbdulrahmanCMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Al-HadhramiASO15,
  author       = {Nasser Al{-}Hadhrami and
                  Benjamin Aziz and
                  Shantanu Sardesai and
                  Lotfi Ben Othmane},
  title        = {Incremental Development of RBAC-Controlled E-Marking System Using
                  the {B} Method},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {532--539},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.95},
  doi          = {10.1109/ARES.2015.95},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Al-HadhramiASO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AouadiTC15,
  author       = {Mohamed H. E. Aouadi and
                  Khalifa Toumi and
                  Ana R. Cavalli},
  title        = {An Active Testing Tool for Security Testing of Distributed Systems},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {735--740},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.97},
  doi          = {10.1109/ARES.2015.97},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AouadiTC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AriuDFFFGR15,
  author       = {Davide Ariu and
                  Luca Didaci and
                  Giorgio Fumera and
                  Enrico Frumento and
                  Federica Freschi and
                  Giorgio Giacinto and
                  Fabio Roli},
  title        = {Yet Another Cybersecurity Roadmapping Methodology},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {719--726},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.87},
  doi          = {10.1109/ARES.2015.87},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AriuDFFFGR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ArminFC15,
  author       = {Jart Armin and
                  Paolo Foti and
                  Marco Cremonini},
  title        = {0-Day Vulnerabilities and Cybercrime},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {711--718},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.55},
  doi          = {10.1109/ARES.2015.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ArminFC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ArminTAGRK15,
  author       = {Jart Armin and
                  Bryn Thompson and
                  Davide Ariu and
                  Giorgio Giacinto and
                  Fabio Roli and
                  Piotr Kijewski},
  title        = {2020 Cybercrime Economic Costs: No Measure No Solution},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {701--710},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.56},
  doi          = {10.1109/ARES.2015.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ArminTAGRK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BacaBCJ15,
  author       = {Dejan Baca and
                  Martin Boldt and
                  Bengt Carlsson and
                  Andreas Jacobsson},
  title        = {A Novel Security-Enhanced Agile Software Development Process Applied
                  in an Industrial Setting},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {11--19},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.45},
  doi          = {10.1109/ARES.2015.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BacaBCJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BaggiliOABM15,
  author       = {Ibrahim M. Baggili and
                  Jeff Oduro and
                  Kyle Anthony and
                  Frank Breitinger and
                  Glenn McGee},
  title        = {Watch What You Wear: Preliminary Forensic Analysis of Smart Watches},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {303--311},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.39},
  doi          = {10.1109/ARES.2015.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BaggiliOABM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BakondiPEHJ15,
  author       = {Bence Gabor Bakondi and
                  Andreas Peter and
                  Maarten H. Everts and
                  Pieter H. Hartel and
                  Willem Jonker},
  title        = {Publicly Verifiable Private Aggregation of Time-Series Data},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {50--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.82},
  doi          = {10.1109/ARES.2015.82},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BakondiPEHJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BarbierBR15,
  author       = {Morgan Barbier and
                  Jean{-}Marie Le Bars and
                  Christophe Rosenberger},
  title        = {Image Watermarking with Biometric Data for Copyright Protection},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {618--625},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.100},
  doi          = {10.1109/ARES.2015.100},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BarbierBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BelhaouaneGD15,
  author       = {Malek Belhaouane and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  title        = {On the Isofunctionality of Network Access Control Lists},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {168--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.78},
  doi          = {10.1109/ARES.2015.78},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BelhaouaneGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BosseST15,
  author       = {Sascha Bosse and
                  Matthias Splieth and
                  Klaus Turowski},
  title        = {Optimizing {IT} Service Costs with Respect to the Availability Service
                  Level Objective},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {20--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.11},
  doi          = {10.1109/ARES.2015.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BosseST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Bou-HarbDA15,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A Time Series Approach for Inferring Orchestrated Probing Campaigns
                  by Analyzing Darknet Traffic},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {180--185},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.9},
  doi          = {10.1109/ARES.2015.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Bou-HarbDA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BuccafurriLNN15,
  author       = {Francesco Buccafurri and
                  Gianluca Lax and
                  Serena Nicolazzo and
                  Antonino Nocera},
  title        = {A Model Implementing Certified Reputation and Its Application to TripAdvisor},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {218--223},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.26},
  doi          = {10.1109/ARES.2015.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BuccafurriLNN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BuhovHMWD15,
  author       = {Damjan Buhov and
                  Markus Huber and
                  Georg Merzdovnik and
                  Edgar R. Weippl and
                  Vesna Dimitrova},
  title        = {Network Security Challenges in Android Applications},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {327--332},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.59},
  doi          = {10.1109/ARES.2015.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BuhovHMWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CanforaLMMV15,
  author       = {Gerardo Canfora and
                  Andrea De Lorenzo and
                  Eric Medvet and
                  Francesco Mercaldo and
                  Corrado Aaron Visaggio},
  title        = {Effectiveness of Opcode ngrams for Detection of Multi Family Android
                  Malware},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {333--340},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.57},
  doi          = {10.1109/ARES.2015.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CanforaLMMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CanforaMMV15,
  author       = {Gerardo Canfora and
                  Francesco Mercaldo and
                  Giovanni Moriano and
                  Corrado Aaron Visaggio},
  title        = {Composition-Malware: Building Android Malware at Run Time},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {318--326},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.64},
  doi          = {10.1109/ARES.2015.64},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CanforaMMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CasolaBR15,
  author       = {Valentina Casola and
                  Alessandra De Benedictis and
                  Massimiliano Rak},
  title        = {Security Monitoring in the Cloud: An SLA-Based Approach},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {749--755},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.74},
  doi          = {10.1109/ARES.2015.74},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CasolaBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ChaabouniM15,
  author       = {Sihem Ch{\^{a}}abouni and
                  Amel Meddeb{-}Makhlouf},
  title        = {Error/Intrusion Target Identification on the Physical Layer over a
                  {BICM} Scheme},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {205--210},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.46},
  doi          = {10.1109/ARES.2015.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ChaabouniM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Chan-Tin15,
  author       = {Eric Chan{-}Tin},
  title        = {AnonCall: Making Anonymous Cellular Phone Calls},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {626--631},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.13},
  doi          = {10.1109/ARES.2015.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Chan-Tin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ChenLLZZ15,
  author       = {Jingning Chen and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Fan Zhao and
                  Guang Zhu},
  title        = {A Landmark Calibration Based {IP} Geolocation Approach},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {411--416},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.52},
  doi          = {10.1109/ARES.2015.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ChenLLZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ChengZYL15,
  author       = {Hang Cheng and
                  Xinpeng Zhang and
                  Jiang Yu and
                  Fengyong Li},
  title        = {Markov Process Based Retrieval for Encrypted {JPEG} Images},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {417--421},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.18},
  doi          = {10.1109/ARES.2015.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ChengZYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ChoCSK15,
  author       = {Geumhwan Cho and
                  Junsung Cho and
                  Youngbae Song and
                  Hyoungshick Kim},
  title        = {An Empirical Study of Click Fraud in Mobile Advertising Networks},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {382--388},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.62},
  doi          = {10.1109/ARES.2015.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ChoCSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CholizVM15,
  author       = {Jesus Choliz and
                  Julian Vilas and
                  Jos{\'{e}} Moreira},
  title        = {Independent Security Testing on Agile Software Development: {A} Case
                  Study in a Software Company},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {522--531},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.79},
  doi          = {10.1109/ARES.2015.79},
  timestamp    = {Fri, 22 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CholizVM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ChorasKBYCMEJ15,
  author       = {Michal Choras and
                  Rafal Kozik and
                  Maria Pilar Torres Bruna and
                  Artsiom Yautsiukhin and
                  Andrew Churchill and
                  Iwona Maciejewska and
                  Irene Eguinoa and
                  Adel Jomni},
  title        = {Comprehensive Approach to Increase Cyber Security and Resilience},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {686--692},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.30},
  doi          = {10.1109/ARES.2015.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ChorasKBYCMEJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ClarkCS15,
  author       = {Jason W. Clark and
                  Matt Collins and
                  Jeremy R. Strozer},
  title        = {Malicious Insiders with Ties to the Internet Underground Community},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {374--381},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.63},
  doi          = {10.1109/ARES.2015.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ClarkCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ClarkPBPS15,
  author       = {Shane S. Clark and
                  Aaron Paulos and
                  Brett Benyo and
                  Partha P. Pal and
                  Richard E. Schantz},
  title        = {Empirical Evaluation of the {A3} Environment: Evaluating Defenses
                  Against Zero-Day Attacks},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {80--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.89},
  doi          = {10.1109/ARES.2015.89},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ClarkPBPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CodreanuPS15,
  author       = {Dana Codreanu and
                  Andr{\'{e}} P{\'{e}}ninou and
                  Florence S{\`{e}}des},
  title        = {Video Spatio-Temporal Filtering Based on Cameras and Target Objects
                  Trajectories - Videosurveillance Forensic Framework},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {611--617},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.102},
  doi          = {10.1109/ARES.2015.102},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CodreanuPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CropperUFW15,
  author       = {Jordan Cropper and
                  Johanna Ullrich and
                  Peter Fr{\"{u}}hwirt and
                  Edgar R. Weippl},
  title        = {The Role and Security of Firewalls in IaaS Cloud Computing},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {70--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.50},
  doi          = {10.1109/ARES.2015.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CropperUFW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DeweyRT15,
  author       = {David Dewey and
                  Bradley Reaves and
                  Patrick Traynor},
  title        = {Uncovering Use-After-Free Conditions in Compiled Code},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {90--99},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.61},
  doi          = {10.1109/ARES.2015.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DeweyRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DialloAHKAB15,
  author       = {Mamadou H. Diallo and
                  Michael August and
                  Roger Hallman and
                  Megan Kline and
                  Henry Au and
                  Vic Beach},
  title        = {Nomad: {A} Framework for Developing Mission-Critical Cloud-Based Applications},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {660--669},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.94},
  doi          = {10.1109/ARES.2015.94},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DialloAHKAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DoussAACF15,
  author       = {Aida Ben Chehida Douss and
                  Samiha Ayed and
                  Ryma Abassi and
                  Nora Cuppens and
                  Sihem Guemara El Fatmi},
  title        = {Trust Negotiation Based Approach to Enforce {MANET} Routing Security},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {360--366},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.99},
  doi          = {10.1109/ARES.2015.99},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DoussAACF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DoussAF15,
  author       = {Aida Ben Chehida Douss and
                  Ryma Abassi and
                  Sihem Guemara El Fatmi},
  title        = {A Model for Specification and Validation of a Trust Management Based
                  Security Scheme in a {MANET} Environment},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {341--350},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.92},
  doi          = {10.1109/ARES.2015.92},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DoussAF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FadaiSKM15,
  author       = {Tariq Fadai and
                  Sebastian Schrittwieser and
                  Peter Kieseberg and
                  Martin Mulazzani},
  title        = {Trust me, I'm a Root CA! Analyzing {SSL} Root CAs in Modern Browsers
                  and Operating Systems},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {174--179},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.93},
  doi          = {10.1109/ARES.2015.93},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FadaiSKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FarinaSLK15,
  author       = {Jason Farina and
                  Mark Scanlon and
                  Nhien{-}An Le{-}Khac and
                  M. Tahar Kechadi},
  title        = {Overview of the Forensic Investigation of Cloud Services},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {556--565},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.81},
  doi          = {10.1109/ARES.2015.81},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FarinaSLK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FraczekS15,
  author       = {Wojciech Fraczek and
                  Krzysztof Szczypiorski},
  title        = {Steg Blocks: Ensuring Perfect Undetectability of Network Steganography},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {436--441},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.22},
  doi          = {10.1109/ARES.2015.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FraczekS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FugkeawS15,
  author       = {Somchart Fugkeaw and
                  Hiroyuki Sato},
  title        = {Enabling Constraints and Dynamic Preventive Access Control Policy
                  Enforcement in the Cloud},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {576--583},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.33},
  doi          = {10.1109/ARES.2015.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FugkeawS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FussGGK15,
  author       = {J{\"{u}}rgen Fu{\ss} and
                  Stefan Gradinger and
                  Bernhard Greslehner{-}Nimmervoll and
                  Robert Kolmhofer},
  title        = {Complexity Estimates of a {SHA-1} Near-Collision Attack for {GPU}
                  and {FPGA}},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {274--280},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.34},
  doi          = {10.1109/ARES.2015.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FussGGK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Gorton15,
  author       = {Dan Gorton},
  title        = {Modeling Fraud Prevention of Online Services Using Incident Response
                  Trees and Value at Risk},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {149--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.17},
  doi          = {10.1109/ARES.2015.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Gorton15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Gosselin-Lavigne15,
  author       = {Marc Antoine Gosselin{-}Lavigne and
                  Hugo Gonzalez and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  title        = {A Performance Evaluation of Hash Functions for {IP} Reputation Lookup
                  Using Bloom Filters},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {516--521},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.101},
  doi          = {10.1109/ARES.2015.101},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Gosselin-Lavigne15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GotzfriedHM15,
  author       = {Johannes G{\"{o}}tzfried and
                  Johannes Hampel and
                  Tilo M{\"{u}}ller},
  title        = {Physically Secure Code and Data Storage in Autonomously Booting Systems},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {199--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.19},
  doi          = {10.1109/ARES.2015.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GotzfriedHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HebbalLM15,
  author       = {Yacine Hebbal and
                  Sylvie Laniepce and
                  Jean{-}Marc Menaud},
  title        = {Virtual Machine Introspection: Techniques and Applications},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {676--685},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.43},
  doi          = {10.1109/ARES.2015.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HebbalLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HellwigQHMH15,
  author       = {Otto Hellwig and
                  Gerald Quirchmayr and
                  Edith Huber and
                  Timo Mischitz and
                  Markus Huber},
  title        = {Towards a CERT-Communication Model as Basis to Software Assurance},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {481--485},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.83},
  doi          = {10.1109/ARES.2015.83},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HellwigQHMH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HineyDSG15,
  author       = {Jason Hiney and
                  Tejas Dakve and
                  Krzysztof Szczypiorski and
                  Kris Gaj},
  title        = {Using Facebook for Image Steganography},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {442--447},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.20},
  doi          = {10.1109/ARES.2015.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HineyDSG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HiranoTY15,
  author       = {Manabu Hirano and
                  Hayate Takase and
                  Koki Yoshida},
  title        = {Evaluation of a Sector-Hash Based Rapid File Detection Method for
                  Monitoring Infrastructure-as-a-Service Cloud Platforms},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {584--591},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.15},
  doi          = {10.1109/ARES.2015.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HiranoTY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HorschHB15,
  author       = {Moritz Horsch and
                  Andreas H{\"{u}}lsing and
                  Johannes Buchmann},
  title        = {{PALPAS} - PAssword Less PAssword Synchronization},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {30--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.23},
  doi          = {10.1109/ARES.2015.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HorschHB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HummerKNFP15,
  author       = {Matthias Hummer and
                  Michael Kunz and
                  Michael Netter and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Advanced Identity and Access Policy Management Using Contextual Data},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {40--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.40},
  doi          = {10.1109/ARES.2015.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HummerKNFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HusakCJC15,
  author       = {Martin Hus{\'{a}}k and
                  Milan Cerm{\'{a}}k and
                  Tom{\'{a}}s Jirs{\'{\i}}k and
                  Pavel Celeda},
  title        = {Network-Based {HTTPS} Client Identification Using {SSL/TLS} Fingerprinting},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {389--396},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.35},
  doi          = {10.1109/ARES.2015.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HusakCJC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HusakVV15,
  author       = {Martin Hus{\'{a}}k and
                  Petr Velan and
                  Jan Vykopal},
  title        = {Security Monitoring of {HTTP} Traffic Using Extended Flows},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {258--265},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.42},
  doi          = {10.1109/ARES.2015.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HusakVV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/IchifujiKS15,
  author       = {Yu Ichifuji and
                  Noriaki Koide and
                  Noboru Sonehara},
  title        = {Impacts of Tourist Accommodations as Temporal Shelter on Evacuee Overflow
                  for the Reassignment of Shelters Jurisdiction},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {281--286},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.66},
  doi          = {10.1109/ARES.2015.66},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/IchifujiKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/JaatunT15,
  author       = {Martin Gilje Jaatun and
                  Inger Anne T{\o}ndel},
  title        = {How Much Cloud Can You Handle?},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {467--473},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.38},
  doi          = {10.1109/ARES.2015.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/JaatunT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/JagerKLSW15,
  author       = {Bernd J{\"{a}}ger and
                  Reiner Kraft and
                  Sebastian Luhn and
                  Annika Selzer and
                  Ulrich Waldmann},
  title        = {The Measurement of Data Locations in the Cloud},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {670--675},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.37},
  doi          = {10.1109/ARES.2015.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/JagerKLSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Janicki15,
  author       = {Artur Janicki},
  title        = {Novel Method of Hiding Information in {IP} Telephony Using Pitch Approximation},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {429--435},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.12},
  doi          = {10.1109/ARES.2015.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Janicki15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/JollyHR15,
  author       = {Germain Jolly and
                  Baptiste Hemery and
                  Christophe Rosenberger},
  title        = {Generation of Local and Expected Behaviors of a Smart Card Application
                  to Detect Software Anomaly},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {474--480},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.76},
  doi          = {10.1109/ARES.2015.76},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/JollyHR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KalpakisTMPVMPK15,
  author       = {George Kalpakis and
                  Theodora Tsikrika and
                  Fotini Markatopoulou and
                  Nikiforos Pittaras and
                  Stefanos Vrochidis and
                  Vasileios Mezaris and
                  Ioannis Patras and
                  Ioannis Kompatsiaris},
  title        = {Concept Detection in Multimedia Web Resources About Home Made Explosives},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {632--641},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.85},
  doi          = {10.1109/ARES.2015.85},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KalpakisTMPVMPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KatiluFA15,
  author       = {Victoria M. Katilu and
                  Virginia N. L. Franqueira and
                  Olga Angelopoulou},
  title        = {Challenges of Data Provenance for Cloud Forensic Investigations},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {312--317},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.54},
  doi          = {10.1109/ARES.2015.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KatiluFA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KaurW015,
  author       = {Jaspreet Kaur and
                  Steffen Wendzel and
                  Michael Meier},
  title        = {Countermeasures for Covert Channel-Internal Control Protocols},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {422--428},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.88},
  doi          = {10.1109/ARES.2015.88},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KaurW015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KawakamiGDN15,
  author       = {Henrique Kawakami and
                  Roberto Gallo and
                  Ricardo Dahab and
                  Erick Nascimento},
  title        = {Hardware Security Evaluation Using Assurance Case Models},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {193--198},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.60},
  doi          = {10.1109/ARES.2015.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KawakamiGDN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Kilger15,
  author       = {Max Kilger},
  title        = {Integrating Human Behavior Into the Development of Future Cyberterrorism
                  Scenarios},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {693--700},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.105},
  doi          = {10.1109/ARES.2015.105},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Kilger15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KiyomotoNTH15,
  author       = {Shinsaku Kiyomoto and
                  Toru Nakamura and
                  Haruo Takasaki and
                  Tatsuhiko Hirabayashi},
  title        = {Personal Agent for Services in {ITS}},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {493--500},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.16},
  doi          = {10.1109/ARES.2015.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KiyomotoNTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KrombholzFRKUW15,
  author       = {Katharina Krombholz and
                  Peter Fr{\"{u}}hwirt and
                  Thomas Rieder and
                  Ioannis Kapsalis and
                  Johanna Ullrich and
                  Edgar R. Weippl},
  title        = {{QR} Code Security - How Secure and Usable Apps Can Protect Users
                  Against Malicious {QR} Codes},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {230--237},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.84},
  doi          = {10.1109/ARES.2015.84},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KrombholzFRKUW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KulykNBVHKB15,
  author       = {Oksana Kulyk and
                  Stephan Neumann and
                  Jurlind Budurushi and
                  Melanie Volkamer and
                  Rolf Haenni and
                  Reto E. Koenig and
                  Phil{\'{e}}mon von Bergen},
  title        = {Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {224--229},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.75},
  doi          = {10.1109/ARES.2015.75},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KulykNBVHKB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KursaweP15,
  author       = {Klaus Kursawe and
                  Christiane Peters},
  title        = {Structural Weaknesses in the Open Smart Grid Protocol},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.67},
  doi          = {10.1109/ARES.2015.67},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KursaweP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Lindemann15,
  author       = {Jens Lindemann},
  title        = {Towards Abuse Detection and Prevention in IaaS Cloud Computing},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {211--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.72},
  doi          = {10.1109/ARES.2015.72},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Lindemann15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LindenlaufHS15,
  author       = {Simon Lindenlauf and
                  Hans H{\"{o}}fken and
                  Marko Schuba},
  title        = {Cold Boot Attacks on {DDR2} and {DDR3} {SDRAM}},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {287--292},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.28},
  doi          = {10.1109/ARES.2015.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LindenlaufHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LopezMM15,
  author       = {Jorge L{\'{o}}pez and
                  St{\'{e}}phane Maag and
                  Gerardo Morales},
  title        = {{TEAR:} {A} Multi-purpose Formal Language Specification for TEsting
                  at Runtime},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {727--734},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.90},
  doi          = {10.1109/ARES.2015.90},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LopezMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LoughlinA15,
  author       = {Michael Loughlin and
                  Asma Adnane},
  title        = {Privacy and Trust in Smart Camera Sensor Networks},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {244--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.31},
  doi          = {10.1109/ARES.2015.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LoughlinA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MachadoBSS15,
  author       = {Raphael C. S. Machado and
                  Davidson R. Boccardo and
                  Vin{\'{\i}}cius Gusm{\~{a}}o Pereira de S{\'{a}} and
                  Jayme Luiz Szwarcfiter},
  title        = {Fair Fingerprinting Protocol for Attesting Software Misuses},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {110--119},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.29},
  doi          = {10.1109/ARES.2015.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MachadoBSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MansorMAM15,
  author       = {Hafizah Mansor and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Keith Mayes},
  title        = {Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {139--148},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.58},
  doi          = {10.1109/ARES.2015.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MansorMAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MathieuDMSBACLT15,
  author       = {Bertrand Mathieu and
                  Guillaume Doyen and
                  Wissam Mallouli and
                  Thomas Silverston and
                  Olivier Bettan and
                  Fran{\c{c}}ois{-}Xavier Aguessy and
                  Thibault Cholez and
                  Abdelkader Lahmadi and
                  Patrick Truong and
                  Edgardo Montes de Oca},
  title        = {Monitoring and Securing New Functions Deployed in a Virtualized Networking
                  Environment},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {741--748},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.71},
  doi          = {10.1109/ARES.2015.71},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MathieuDMSBACLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MutawaBFM15,
  author       = {Noora Al Mutawa and
                  Joanne Bryce and
                  Virginia N. L. Franqueira and
                  Andrew Marrington},
  title        = {Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical
                  Analysis of Child Pornography Cases Using {P2P} Networks},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {293--302},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.49},
  doi          = {10.1109/ARES.2015.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MutawaBFM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/NeunerMSW15,
  author       = {Sebastian Neuner and
                  Martin Mulazzani and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  title        = {Gradually Improving the Forensic Process},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {404--410},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.32},
  doi          = {10.1109/ARES.2015.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/NeunerMSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/OueslatiRO15,
  author       = {Hela Oueslati and
                  Mohammad Masudur Rahman and
                  Lotfi Ben Othmane},
  title        = {Literature Review of the Challenges of Developing Secure Software
                  Using the Agile Approach},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {540--547},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.69},
  doi          = {10.1109/ARES.2015.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/OueslatiRO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PangZ15,
  author       = {Jun Pang and
                  Yang Zhang},
  title        = {Event Prediction with Community Leaders},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {238--243},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.24},
  doi          = {10.1109/ARES.2015.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PangZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ParkKPK15,
  author       = {Jaemin Park and
                  Eunchan Kim and
                  Sungjin Park and
                  Cheoloh Kang},
  title        = {Advanced Attribute-Based Key Management for Mobile Devices in Hybrid
                  Clouds},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {566--575},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.27},
  doi          = {10.1109/ARES.2015.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ParkKPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PeltolaK15,
  author       = {Matti J. Peltola and
                  Pekka Kekolahti},
  title        = {Risk Assessment of Public Safety and Security Mobile Service},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {351--359},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.65},
  doi          = {10.1109/ARES.2015.65},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PeltolaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PetkosPK15,
  author       = {Georgios Petkos and
                  Symeon Papadopoulos and
                  Yiannis Kompatsiaris},
  title        = {PScore: {A} Framework for Enhancing Privacy Awareness in Online Social
                  Networks},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {592--600},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.80},
  doi          = {10.1109/ARES.2015.80},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PetkosPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PhanM15,
  author       = {Quoc{-}Sang Phan and
                  Pasquale Malacaria},
  title        = {All-Solution Satisfiability Modulo Theories: Applications, Algorithms
                  and Benchmarks},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {100--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.14},
  doi          = {10.1109/ARES.2015.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PhanM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PohlsS15,
  author       = {Henrich Christopher P{\"{o}}hls and
                  Kai Samelin},
  title        = {Accountable Redactable Signatures},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {60--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.10},
  doi          = {10.1109/ARES.2015.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PohlsS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ProtsenkoKM15,
  author       = {Mykola Protsenko and
                  Sebastien Kreuter and
                  Tilo M{\"{u}}ller},
  title        = {Dynamic Self-Protection and Tamperproofing for Android Apps Using
                  Native Code},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {129--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.98},
  doi          = {10.1109/ARES.2015.98},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ProtsenkoKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/RenatusTE15,
  author       = {Stephan Renatus and
                  Clemens Teichmann and
                  J{\"{o}}rn Eichler},
  title        = {Method Selection and Tailoring for Agile Threat Assessment and Mitigation},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {548--555},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.96},
  doi          = {10.1109/ARES.2015.96},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/RenatusTE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SchutSFL15,
  author       = {Hessel Schut and
                  Mark Scanlon and
                  Jason Farina and
                  Nhien{-}An Le{-}Khac},
  title        = {Towards the Forensic Identification and Investigation of Cloud Hosted
                  Servers through Non-Invasive Wiretaps},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {249--257},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.77},
  doi          = {10.1109/ARES.2015.77},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SchutSFL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ShojaieFS15,
  author       = {Bahareh Shojaie and
                  Hannes Federrath and
                  Iman Saberi},
  title        = {The Effects of Cultural Dimensions on the Development of an {ISMS}
                  Based on the {ISO} 27001},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {159--167},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.25},
  doi          = {10.1109/ARES.2015.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ShojaieFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SohnR15,
  author       = {Jung{-}Woo Sohn and
                  Jungwoo Ryoo},
  title        = {Securing Web Applications with Better "Patches": An Architectural
                  Approach for Systematic Input Validation with Security Patterns},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {486--492},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.106},
  doi          = {10.1109/ARES.2015.106},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SohnR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SokolHL15,
  author       = {Pavol Sokol and
                  Martin Hus{\'{a}}k and
                  Frantiek Liptak},
  title        = {Deploying Honeypots and Honeynets: Issue of Privacy},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {397--403},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.91},
  doi          = {10.1109/ARES.2015.91},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SokolHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TaubmannHWHRS15,
  author       = {Benjamin Taubmann and
                  Manuel Huber and
                  Sascha Wessel and
                  Lukas Heim and
                  Hans Peter Reiser and
                  Georg Sigl},
  title        = {A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {120--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.47},
  doi          = {10.1109/ARES.2015.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TaubmannHWHRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ThalerHASH15,
  author       = {Stefan Thaler and
                  Jerry den Hartog and
                  Dhouha Ayed and
                  Dieter Sommer and
                  Michael Hitchens},
  title        = {Cross-Domain Attribute Conversion for Authentication and Authorization},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {652--659},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.41},
  doi          = {10.1109/ARES.2015.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ThalerHASH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TianWHLCWC15,
  author       = {Hui Tian and
                  Yanpeng Wu and
                  Yongfeng Huang and
                  Jin Liu and
                  Yonghong Chen and
                  Tian Wang and
                  Yiqiao Cai},
  title        = {Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics
                  of Pulse Positions},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {455--460},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.21},
  doi          = {10.1109/ARES.2015.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TianWHLCWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TjoaKMS15,
  author       = {Simon Tjoa and
                  Patrick Kochberger and
                  Christoph Malin and
                  Andreas Schmoll},
  title        = {An Open Source Code Analyzer and Reviewer {(OSCAR)} Framework},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {511--515},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.36},
  doi          = {10.1109/ARES.2015.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TjoaKMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TsikrikaKVKPKMW15,
  author       = {Theodora Tsikrika and
                  George Kalpakis and
                  Stefanos Vrochidis and
                  Ioannis Kompatsiaris and
                  Iraklis Paraskakis and
                  Isaak Kavasidis and
                  Jonathan Middleton and
                  Una Williamson},
  title        = {A Framework for the Discovery, Analysis, and Retrieval of Multimedia
                  Homemade Explosives Information on the Web},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {601--610},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.86},
  doi          = {10.1109/ARES.2015.86},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TsikrikaKVKPKMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/UllrichKKW15,
  author       = {Johanna Ullrich and
                  Peter Kieseberg and
                  Katharina Krombholz and
                  Edgar R. Weippl},
  title        = {On Reconnaissance with IPv6: {A} Pattern-Based Scanning Approach},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {186--192},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.48},
  doi          = {10.1109/ARES.2015.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/UllrichKKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Watney15,
  author       = {Murdoch Watney},
  title        = {Intensifying State Surveillance of Electronic Communications: {A}
                  Legal Solution in Addressing Extremism or Not?},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {367--373},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.51},
  doi          = {10.1109/ARES.2015.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Watney15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ZahoranskyBK15,
  author       = {Richard M. Zahoransky and
                  Christian Brenig and
                  Thomas G. Koslowski},
  title        = {Towards a Process-Centered Resilience Framework},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {266--273},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.68},
  doi          = {10.1109/ARES.2015.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ZahoranskyBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ZhangLYYL15,
  author       = {Yi Zhang and
                  Xiangyang Luo and
                  Chunfang Yang and
                  Dengpan Ye and
                  Fenlin Liu},
  title        = {A JPEG-Compression Resistant Adaptive Steganography Based on Relative
                  Relationship between {DCT} Coefficients},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {461--466},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.53},
  doi          = {10.1109/ARES.2015.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ZhangLYYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ZhauniarovichPG15,
  author       = {Yury Zhauniarovich and
                  Anton Philippov and
                  Olga Gadyatskaya and
                  Bruno Crispo and
                  Fabio Massacci},
  title        = {Towards Black Box Testing of Android Apps},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {501--510},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.70},
  doi          = {10.1109/ARES.2015.70},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ZhauniarovichPG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ZicOLLWC15,
  author       = {John Zic and
                  Nerolie Oakes and
                  Dongxi Liu and
                  Jane Li and
                  Chen Wang and
                  Shiping Chen},
  title        = {A Secure Integrated Platform for Rapdily Formed Multiorganisation
                  Collaborations},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {642--651},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.73},
  doi          = {10.1109/ARES.2015.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ZicOLLWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2015,
  title        = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7299495/proceeding},
  isbn         = {978-1-4673-6590-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics