Search dblp for Publications

export results for "toc:db/conf/csfw/csf2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/csfw/AdaoBRFL14,
  author       = {Pedro Ad{\~{a}}o and
                  Claudio Bozzato and
                  G. Dei Rossi and
                  Riccardo Focardi and
                  Flaminia L. Luccio},
  title        = {Mignis: {A} Semantic Based Tool for Firewall Configuration},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {351--365},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.32},
  doi          = {10.1109/CSF.2014.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AdaoBRFL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AkinyeleBGSS14,
  author       = {Joseph A. Akinyele and
                  Gilles Barthe and
                  Benjamin Gr{\'{e}}goire and
                  Benedikt Schmidt and
                  Pierre{-}Yves Strub},
  title        = {Certified Synthesis of Efficient Batch Verifiers},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {153--165},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.19},
  doi          = {10.1109/CSF.2014.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AkinyeleBGSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AlvimCMMPS14,
  author       = {M{\'{a}}rio S. Alvim and
                  Konstantinos Chatzikokolakis and
                  Annabelle McIver and
                  Carroll Morgan and
                  Catuscia Palamidessi and
                  Geoffrey Smith},
  title        = {Additive and Multiplicative Notions of Leakage, and Their Capacities},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {308--322},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.29},
  doi          = {10.1109/CSF.2014.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AlvimCMMPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesMM14,
  author       = {Michael Backes and
                  Praveen Manoharan and
                  Esfandiar Mohammadi},
  title        = {{TUC:} Time-Sensitive and Modular Analysis of Anonymous Communication},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {383--397},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.34},
  doi          = {10.1109/CSF.2014.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BartheGAHKS14,
  author       = {Gilles Barthe and
                  Marco Gaboardi and
                  Emilio Jes{\'{u}}s Gallego Arias and
                  Justin Hsu and
                  C{\'{e}}sar Kunz and
                  Pierre{-}Yves Strub},
  title        = {Proving Differential Privacy in Hoare Logic},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {411--424},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.36},
  doi          = {10.1109/CSF.2014.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BartheGAHKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BasinCH14,
  author       = {David A. Basin and
                  Cas Cremers and
                  Marko Horvat},
  title        = {Actor Key Compromise: Consequences and Countermeasures},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {244--258},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.25},
  doi          = {10.1109/CSF.2014.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BasinCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BogdanovLLP14,
  author       = {Dan Bogdanov and
                  Peeter Laud and
                  Sven Laur and
                  Pille Pullonen},
  title        = {From Input Private to Universally Composable Secure Multi-party Computation
                  Primitives},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {184--198},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.21},
  doi          = {10.1109/CSF.2014.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BogdanovLLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BugliesiCFKT14,
  author       = {Michele Bugliesi and
                  Stefano Calzavara and
                  Riccardo Focardi and
                  Wilayat Khan and
                  Mauro Tempesta},
  title        = {Provably Sound Browser-Based Enforcement of Web Session Integrity},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {366--380},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.33},
  doi          = {10.1109/CSF.2014.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BugliesiCFKT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BuirasSR14,
  author       = {Pablo Buiras and
                  Deian Stefan and
                  Alejandro Russo},
  title        = {On Dynamic Flow-Sensitive Floating-Label Systems},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {65--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.13},
  doi          = {10.1109/CSF.2014.13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BuirasSR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChaseKLM14,
  author       = {Melissa Chase and
                  Markulf Kohlweiss and
                  Anna Lysyanskaya and
                  Sarah Meiklejohn},
  title        = {Malleable Signatures: New Definitions and Delegatable Anonymous Credentials},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {199--213},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.22},
  doi          = {10.1109/CSF.2014.22},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/ChaseKLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChudnovKN14,
  author       = {Andrey Chudnov and
                  George Kuan and
                  David A. Naumann},
  title        = {Information Flow Monitoring as Abstract Interpretation for Relational
                  Logic},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {48--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.12},
  doi          = {10.1109/CSF.2014.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChudnovKN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CramptonP14,
  author       = {Jason Crampton and
                  Alexandre Pinto},
  title        = {Attribute-Based Encryption for Access Control Using Elementary Operations},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {125--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.17},
  doi          = {10.1109/CSF.2014.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CramptonP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CulnaneS14,
  author       = {Chris Culnane and
                  Steve A. Schneider},
  title        = {A Peered Bulletin Board for Robust Use in Verifiable Voting Systems},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {169--183},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.20},
  doi          = {10.1109/CSF.2014.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CulnaneS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DimoulasMAC14,
  author       = {Christos Dimoulas and
                  Scott Moore and
                  Aslan Askarov and
                  Stephen Chong},
  title        = {Declarative Policies for Capability Control},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {3--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.9},
  doi          = {10.1109/CSF.2014.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DimoulasMAC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DoughertyG14,
  author       = {Daniel J. Dougherty and
                  Joshua D. Guttman},
  title        = {Decidability for Lightweight Diffie-Hellman Protocols},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {217--231},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.23},
  doi          = {10.1109/CSF.2014.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DoughertyG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GrossklagsR14,
  author       = {Jens Grossklags and
                  David Reitter},
  title        = {How Task Familiarity and Cognitive Predispositions Impact Behavior
                  in a Security Game of Timing},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {111--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.16},
  doi          = {10.1109/CSF.2014.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GrossklagsR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HarbachFS14,
  author       = {Marian Harbach and
                  Sascha Fahl and
                  Matthew Smith},
  title        = {Who's Afraid of Which Bad Wolf? {A} Survey of {IT} Security Risk Awareness},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {97--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.15},
  doi          = {10.1109/CSF.2014.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/HarbachFS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HsuGHKNPR14,
  author       = {Justin Hsu and
                  Marco Gaboardi and
                  Andreas Haeberlen and
                  Sanjeev Khanna and
                  Arjun Narayan and
                  Benjamin C. Pierce and
                  Aaron Roth},
  title        = {Differential Privacy: An Economic Method for Choosing Epsilon},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {398--410},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.35},
  doi          = {10.1109/CSF.2014.35},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/HsuGHKNPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JagadeesanLPRW14,
  author       = {Radha Jagadeesan and
                  C. M. Lubinski and
                  Corin Pitcher and
                  James Riely and
                  Charles Winebrinner},
  title        = {Certificates for Verifiable Forensics},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {33--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.11},
  doi          = {10.1109/CSF.2014.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/JagadeesanLPRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JohnsonLG14,
  author       = {Benjamin Johnson and
                  Aron Laszka and
                  Jens Grossklags},
  title        = {The Complexity of Estimating Systematic Risk in Networks},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {325--336},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.30},
  doi          = {10.1109/CSF.2014.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/JohnsonLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KrollSA14,
  author       = {Joshua A. Kroll and
                  Gordon Stewart and
                  Andrew W. Appel},
  title        = {Portable Software Fault Isolation},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {18--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.10},
  doi          = {10.1109/CSF.2014.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KrollSA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LiskovT14,
  author       = {Moses D. Liskov and
                  F. Javier Thayer},
  title        = {Modeling Diffie-Hellman Derivability for Automated Analysis},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {232--243},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.24},
  doi          = {10.1109/CSF.2014.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/LiskovT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LiuRC14,
  author       = {Jia Liu and
                  Mark Dermot Ryan and
                  Liqun Chen},
  title        = {Balancing Societal Security and Individual Privacy: Accountable Escrow
                  System},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {427--440},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.37},
  doi          = {10.1109/CSF.2014.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/LiuRC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MalozemoffKG14,
  author       = {Alex J. Malozemoff and
                  Jonathan Katz and
                  Matthew D. Green},
  title        = {Automated Analysis and Synthesis of Block-Cipher Modes of Operation},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {140--152},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.18},
  doi          = {10.1109/CSF.2014.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MalozemoffKG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MantelPS14,
  author       = {Heiko Mantel and
                  Matthias Perner and
                  Jens Sauer},
  title        = {Noninterference under Weak Memory Models},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {80--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.14},
  doi          = {10.1109/CSF.2014.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MantelPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ModersheimK14,
  author       = {Sebastian M{\"{o}}dersheim and
                  Georgios Katsoris},
  title        = {A Sound Abstraction of the Parsing Problem},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {259--273},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.26},
  doi          = {10.1109/CSF.2014.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ModersheimK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RafnssonS14,
  author       = {Willard Rafnsson and
                  Andrei Sabelfeld},
  title        = {Compositional Information-Flow Security for Interactive Systems},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {277--292},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.27},
  doi          = {10.1109/CSF.2014.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/RafnssonS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/VanhoefGDPR14,
  author       = {Mathy Vanhoef and
                  Willem De Groef and
                  Dominique Devriese and
                  Frank Piessens and
                  Tamara Rezk},
  title        = {Stateful Declassification Policies for Event-Driven Programs},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {293--307},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.28},
  doi          = {10.1109/CSF.2014.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/VanhoefGDPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/VigoNN14,
  author       = {Roberto Vigo and
                  Flemming Nielson and
                  Hanne Riis Nielson},
  title        = {Automated Generation of Attack Trees},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {337--350},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.31},
  doi          = {10.1109/CSF.2014.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/VigoNN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2014,
  title        = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6954678/proceeding},
  isbn         = {978-1-4799-4290-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics