Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/csiirw/cisr2014.bht:"
@inproceedings{DBLP:conf/csiirw/AissaRAMS14, author = {Anis Ben Aissa and Latifa Ben Arfa Rabai and Robert K. Abercrombie and Ali Mili and Frederick T. Sheldon}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Quantifying availability in {SCADA} environments using the cyber security metric {MFC}}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {81--84}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602103}, doi = {10.1145/2602087.2602103}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/AissaRAMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/AlwaselW14, author = {Bader Alwasel and Stephen D. Wolthusen}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Reconstruction of structural controllability over Erd{\H{o}}s-R{\'{e}}nyi graphs via power dominating sets}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {57--60}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602095}, doi = {10.1145/2602087.2602095}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/AlwaselW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ChenA14, author = {Qian Chen and Sherif Abdelwahed}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Towards realizing self-protecting {SCADA} systems}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {105--108}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602113}, doi = {10.1145/2602087.2602113}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ChenA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ChinCFH14, author = {George Chin Jr. and Sutanay Choudhury and John Feo and Lawrence B. Holder}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Predicting and detecting emerging cyberattack patterns using StreamWorks}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {93--96}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602111}, doi = {10.1145/2602087.2602111}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ChinCFH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/CzejdoIBFG14, author = {Bogdan D. Czejdo and Michael D. Iannacone and Robert A. Bridges and Erik M. Ferragut and John R. Goodall}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Integration of external data sources with cyber security data warehouse}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {49--52}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602098}, doi = {10.1145/2602087.2602098}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/CzejdoIBFG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/DarabsehN14, author = {Alaa Darabseh and Akbar Siami Namin}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {The accuracy of user authentication through keystroke features using the most frequent words}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {85--88}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602102}, doi = {10.1145/2602087.2602102}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/DarabsehN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/DongDNK14, author = {Jin Dong and Seddik M. Djouadi and James J. Nutaro and Phani Teja Kuruganti}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Secure control systems with application to cyber-physical systems}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {9--12}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602094}, doi = {10.1145/2602087.2602094}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/DongDNK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/FazeenBD14, author = {Mohamed Fazeen and Garima Bajwa and Ram Dantu}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Context-aware multimedia encryption in mobile platforms}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {53--56}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602115}, doi = {10.1145/2602087.2602115}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/FazeenBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/GallegeGHR14, author = {Lahiru S. Gallege and Dimuthu U. Gamage and James H. Hill and Rajeev R. Raje}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Towards trust-based recommender systems for online software services}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {61--64}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602118}, doi = {10.1145/2602087.2602118}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/GallegeGHR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/GoffGM14, author = {Ed Goff and Cliff Glantz and Rebecca Massello}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Cybersecurity procurement language for energy delivery systems}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {77--79}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602097}, doi = {10.1145/2602087.2602097}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/GoffGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/GuoB14, author = {Minzhe Guo and Prabir Bhattacharya}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Diverse virtual replicas for improving intrusion tolerance in cloud}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {41--44}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602116}, doi = {10.1145/2602087.2602116}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/GuoB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/HaneyP14, author = {Michael Haney and Mauricio Papa}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {A framework for the design and deployment of a {SCADA} honeynet}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {121--124}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602110}, doi = {10.1145/2602087.2602110}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/HaneyP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/HewettRK14, author = {Rattikorn Hewett and Sudeeptha Rudrapattana and Phongphun Kijsanayothin}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Cyber-security analysis of smart grid {SCADA} systems with game models}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {109--112}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602089}, doi = {10.1145/2602087.2602089}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/HewettRK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/KienzleEE14, author = {Darrell M. Kienzle and Nathan S. Evans and Matthew C. Elder}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {{NICE:} endpoint-based topology discovery}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {97--100}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602104}, doi = {10.1145/2602087.2602104}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/KienzleEE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/KimEN14, author = {Sun{-}il Kim and William Edmonds and Nnamdi Nwanze}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {On {GPU} accelerated tuning for a payload anomaly-based network intrusion detection scheme}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {1--4}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602093}, doi = {10.1145/2602087.2602093}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/KimEN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/KongBH14, author = {Liang Kong and Gavin Bauer and John Hale}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Location-based device grouping for function restriction}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {113--116}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602099}, doi = {10.1145/2602087.2602099}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/KongBH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LouthanHHHH14, author = {George Louthan and Michael Haney and Phoebe Hardwicke and Peter J. Hawrylak and John Hale}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Hybrid extensions for stateful attack graphs}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {101--104}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602106}, doi = {10.1145/2602087.2602106}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/LouthanHHHH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LucasFJC14, author = {Brian Lucas and Errin W. Fulp and David J. John and Daniel A. Ca{\~{n}}as}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {An initial framework for evolving computer configurations as a moving target defense}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {69--72}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602100}, doi = {10.1145/2602087.2602100}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/LucasFJC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/NagD14, author = {Abhijit Kumar Nag and Dipankar Dasgupta}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {An adaptive approach for continuous multi-factor authentication in an identity eco-system}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {65--68}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602112}, doi = {10.1145/2602087.2602112}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/NagD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/NivethanPH14, author = {Jeyasingam Nivethan and Mauricio Papa and Peter J. Hawrylak}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Modeling and simulation of electric power substation employing an {IEC} 61850 network}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {89--92}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602096}, doi = {10.1145/2602087.2602096}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/NivethanPH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/NoelJ14, author = {Steven Noel and Sushil Jajodia}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Metrics suite for network attack graph analytics}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {5--8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602117}, doi = {10.1145/2602087.2602117}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/NoelJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/PonomarevWA14, author = {Stanislav Ponomarev and Nathan Wallace and Travis Atkison}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Detection of {SSH} host spoofing in control systems through network telemetry analysis}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {21--24}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602109}, doi = {10.1145/2602087.2602109}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/PonomarevWA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Robinson-Mallett14, author = {Christopher Robinson{-}Mallett}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Coordinating security and safety engineering processes in automotive electronics development}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {45--48}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602091}, doi = {10.1145/2602087.2602091}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Robinson-Mallett14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/SherburneMT14, author = {Matthew Sherburne and Randy C. Marchany and Joseph G. Tront}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {37--40}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602107}, doi = {10.1145/2602087.2602107}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/SherburneMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Torrey14, author = {Jacob Torrey}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {MoRE: measurement of running executables}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {117--120}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602105}, doi = {10.1145/2602087.2602105}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Torrey14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/VelichetiFPRH14, author = {Lakshmi Manohar Rao Velicheti and Dennis C. Feiock and Manjula Peiris and Rajeev R. Raje and James H. Hill}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Towards modeling the behavior of static code analysis tools}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {17--20}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602101}, doi = {10.1145/2602087.2602101}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/VelichetiFPRH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WallacePA14, author = {Nathan Wallace and Stanislav Ponomarev and Travis Atkison}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {A dimensional transformation scheme for power grid cyber event detection}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {13--16}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602108}, doi = {10.1145/2602087.2602108}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/WallacePA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WhitehurstAM14, author = {Lindsey N. Whitehurst and Todd R. Andel and Jeffrey Todd McDonald}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Exploring security in ZigBee networks}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {25--28}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602090}, doi = {10.1145/2602087.2602090}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/WhitehurstAM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WuH14, author = {Shaun{-}Inn Wu and Hieu Trong Ho}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Image enhanced {CAPTCHA} for web security}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {29--32}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602114}, doi = {10.1145/2602087.2602114}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/WuH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/YuanNBY14, author = {Xiaohong Yuan and Emmanuel Borkor Nuakoh and Jodria S. Beal and Huiming Yu}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Retrieving relevant {CAPEC} attack patterns for secure software development}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {33--36}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602092}, doi = {10.1145/2602087.2602092}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/YuanNBY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ZhuangDO14, author = {Rui Zhuang and Scott A. DeLoach and Xinming Ou}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {A model for analyzing the effect of moving target defenses on enterprise networks}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {73--76}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602088}, doi = {10.1145/2602087.2602088}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ZhuangDO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csiirw/2014, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2602087}, isbn = {978-1-4503-2812-8}, timestamp = {Wed, 30 Mar 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.