Search dblp for Publications

export results for "toc:db/conf/csiirw/cisr2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/csiirw/AissaRAMS14,
  author       = {Anis Ben Aissa and
                  Latifa Ben Arfa Rabai and
                  Robert K. Abercrombie and
                  Ali Mili and
                  Frederick T. Sheldon},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Quantifying availability in {SCADA} environments using the cyber security
                  metric {MFC}},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {81--84},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602103},
  doi          = {10.1145/2602087.2602103},
  timestamp    = {Wed, 31 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/AissaRAMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/AlwaselW14,
  author       = {Bader Alwasel and
                  Stephen D. Wolthusen},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Reconstruction of structural controllability over Erd{\H{o}}s-R{\'{e}}nyi
                  graphs via power dominating sets},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {57--60},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602095},
  doi          = {10.1145/2602087.2602095},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/AlwaselW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ChenA14,
  author       = {Qian Chen and
                  Sherif Abdelwahed},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Towards realizing self-protecting {SCADA} systems},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {105--108},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602113},
  doi          = {10.1145/2602087.2602113},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ChenA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ChinCFH14,
  author       = {George Chin Jr. and
                  Sutanay Choudhury and
                  John Feo and
                  Lawrence B. Holder},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Predicting and detecting emerging cyberattack patterns using StreamWorks},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {93--96},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602111},
  doi          = {10.1145/2602087.2602111},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ChinCFH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/CzejdoIBFG14,
  author       = {Bogdan D. Czejdo and
                  Michael D. Iannacone and
                  Robert A. Bridges and
                  Erik M. Ferragut and
                  John R. Goodall},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Integration of external data sources with cyber security data warehouse},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {49--52},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602098},
  doi          = {10.1145/2602087.2602098},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/CzejdoIBFG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/DarabsehN14,
  author       = {Alaa Darabseh and
                  Akbar Siami Namin},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {The accuracy of user authentication through keystroke features using
                  the most frequent words},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {85--88},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602102},
  doi          = {10.1145/2602087.2602102},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/DarabsehN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/DongDNK14,
  author       = {Jin Dong and
                  Seddik M. Djouadi and
                  James J. Nutaro and
                  Phani Teja Kuruganti},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Secure control systems with application to cyber-physical systems},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {9--12},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602094},
  doi          = {10.1145/2602087.2602094},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/DongDNK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/FazeenBD14,
  author       = {Mohamed Fazeen and
                  Garima Bajwa and
                  Ram Dantu},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Context-aware multimedia encryption in mobile platforms},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {53--56},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602115},
  doi          = {10.1145/2602087.2602115},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/FazeenBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/GallegeGHR14,
  author       = {Lahiru S. Gallege and
                  Dimuthu U. Gamage and
                  James H. Hill and
                  Rajeev R. Raje},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Towards trust-based recommender systems for online software services},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {61--64},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602118},
  doi          = {10.1145/2602087.2602118},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/GallegeGHR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/GoffGM14,
  author       = {Ed Goff and
                  Cliff Glantz and
                  Rebecca Massello},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Cybersecurity procurement language for energy delivery systems},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {77--79},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602097},
  doi          = {10.1145/2602087.2602097},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/GoffGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/GuoB14,
  author       = {Minzhe Guo and
                  Prabir Bhattacharya},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Diverse virtual replicas for improving intrusion tolerance in cloud},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {41--44},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602116},
  doi          = {10.1145/2602087.2602116},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/GuoB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/HaneyP14,
  author       = {Michael Haney and
                  Mauricio Papa},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {A framework for the design and deployment of a {SCADA} honeynet},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {121--124},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602110},
  doi          = {10.1145/2602087.2602110},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/HaneyP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/HewettRK14,
  author       = {Rattikorn Hewett and
                  Sudeeptha Rudrapattana and
                  Phongphun Kijsanayothin},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Cyber-security analysis of smart grid {SCADA} systems with game models},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {109--112},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602089},
  doi          = {10.1145/2602087.2602089},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/HewettRK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/KienzleEE14,
  author       = {Darrell M. Kienzle and
                  Nathan S. Evans and
                  Matthew C. Elder},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {{NICE:} endpoint-based topology discovery},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {97--100},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602104},
  doi          = {10.1145/2602087.2602104},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/KienzleEE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/KimEN14,
  author       = {Sun{-}il Kim and
                  William Edmonds and
                  Nnamdi Nwanze},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {On {GPU} accelerated tuning for a payload anomaly-based network intrusion
                  detection scheme},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {1--4},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602093},
  doi          = {10.1145/2602087.2602093},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/KimEN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/KongBH14,
  author       = {Liang Kong and
                  Gavin Bauer and
                  John Hale},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Location-based device grouping for function restriction},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {113--116},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602099},
  doi          = {10.1145/2602087.2602099},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/KongBH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LouthanHHHH14,
  author       = {George Louthan and
                  Michael Haney and
                  Phoebe Hardwicke and
                  Peter J. Hawrylak and
                  John Hale},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Hybrid extensions for stateful attack graphs},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {101--104},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602106},
  doi          = {10.1145/2602087.2602106},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/LouthanHHHH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LucasFJC14,
  author       = {Brian Lucas and
                  Errin W. Fulp and
                  David J. John and
                  Daniel A. Ca{\~{n}}as},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {An initial framework for evolving computer configurations as a moving
                  target defense},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {69--72},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602100},
  doi          = {10.1145/2602087.2602100},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/LucasFJC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/NagD14,
  author       = {Abhijit Kumar Nag and
                  Dipankar Dasgupta},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {An adaptive approach for continuous multi-factor authentication in
                  an identity eco-system},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {65--68},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602112},
  doi          = {10.1145/2602087.2602112},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/NagD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/NivethanPH14,
  author       = {Jeyasingam Nivethan and
                  Mauricio Papa and
                  Peter J. Hawrylak},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Modeling and simulation of electric power substation employing an
                  {IEC} 61850 network},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {89--92},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602096},
  doi          = {10.1145/2602087.2602096},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/NivethanPH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/NoelJ14,
  author       = {Steven Noel and
                  Sushil Jajodia},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Metrics suite for network attack graph analytics},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {5--8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602117},
  doi          = {10.1145/2602087.2602117},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/NoelJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/PonomarevWA14,
  author       = {Stanislav Ponomarev and
                  Nathan Wallace and
                  Travis Atkison},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Detection of {SSH} host spoofing in control systems through network
                  telemetry analysis},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {21--24},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602109},
  doi          = {10.1145/2602087.2602109},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/PonomarevWA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Robinson-Mallett14,
  author       = {Christopher Robinson{-}Mallett},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Coordinating security and safety engineering processes in automotive
                  electronics development},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {45--48},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602091},
  doi          = {10.1145/2602087.2602091},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Robinson-Mallett14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SherburneMT14,
  author       = {Matthew Sherburne and
                  Randy C. Marchany and
                  Joseph G. Tront},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Implementing moving target IPv6 defense to secure 6LoWPAN in the internet
                  of things and smart grid},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {37--40},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602107},
  doi          = {10.1145/2602087.2602107},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/SherburneMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Torrey14,
  author       = {Jacob Torrey},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {MoRE: measurement of running executables},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {117--120},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602105},
  doi          = {10.1145/2602087.2602105},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Torrey14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/VelichetiFPRH14,
  author       = {Lakshmi Manohar Rao Velicheti and
                  Dennis C. Feiock and
                  Manjula Peiris and
                  Rajeev R. Raje and
                  James H. Hill},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Towards modeling the behavior of static code analysis tools},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {17--20},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602101},
  doi          = {10.1145/2602087.2602101},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/VelichetiFPRH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/WallacePA14,
  author       = {Nathan Wallace and
                  Stanislav Ponomarev and
                  Travis Atkison},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {A dimensional transformation scheme for power grid cyber event detection},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {13--16},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602108},
  doi          = {10.1145/2602087.2602108},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/WallacePA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/WhitehurstAM14,
  author       = {Lindsey N. Whitehurst and
                  Todd R. Andel and
                  Jeffrey Todd McDonald},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Exploring security in ZigBee networks},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {25--28},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602090},
  doi          = {10.1145/2602087.2602090},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/WhitehurstAM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/WuH14,
  author       = {Shaun{-}Inn Wu and
                  Hieu Trong Ho},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Image enhanced {CAPTCHA} for web security},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {29--32},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602114},
  doi          = {10.1145/2602087.2602114},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/WuH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/YuanNBY14,
  author       = {Xiaohong Yuan and
                  Emmanuel Borkor Nuakoh and
                  Jodria S. Beal and
                  Huiming Yu},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Retrieving relevant {CAPEC} attack patterns for secure software development},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {33--36},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602092},
  doi          = {10.1145/2602087.2602092},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/YuanNBY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ZhuangDO14,
  author       = {Rui Zhuang and
                  Scott A. DeLoach and
                  Xinming Ou},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {A model for analyzing the effect of moving target defenses on enterprise
                  networks},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {73--76},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602088},
  doi          = {10.1145/2602087.2602088},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ZhuangDO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csiirw/2014,
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2602087},
  isbn         = {978-1-4503-2812-8},
  timestamp    = {Wed, 30 Mar 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics