Search dblp for Publications

export results for "toc:db/conf/sin/sin2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sin/AbtGB14,
  author       = {Sebastian Abt and
                  Sebastian G{\"{a}}rtner and
                  Harald Baier},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {A Small Data Approach to Identification of Individuals on the Transport
                  Layer using Statistical Behaviour Templates},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {25},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659681},
  doi          = {10.1145/2659651.2659681},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AbtGB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AdnanLRVLMR14,
  author       = {Muhammad Adnan and
                  Antonio Lima and
                  Luca Rossi and
                  Suresh Veluru and
                  Paul A. Longley and
                  Mirco Musolesi and
                  Muttukrishnan Rajarajan},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {The Uncertainty of Identity Toolset: Analysing Digital Traces for
                  User Profiling},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {254},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659741},
  doi          = {10.1145/2659651.2659741},
  timestamp    = {Wed, 26 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/AdnanLRVLMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AgafinK14,
  author       = {Sergey Agafin and
                  Anton Krasnopevtsev},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Memory access time as entropy source for {RNG}},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {176},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659695},
  doi          = {10.1145/2659651.2659695},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AgafinK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AggarwalKS14,
  author       = {Shivam Aggarwal and
                  Vishal Kumar and
                  S. D. Sudarsan},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Identification and Detection of Phishing Emails Using Natural Language
                  Processing Techniques},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {217},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659691},
  doi          = {10.1145/2659651.2659691},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/AggarwalKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AgostaBPS14,
  author       = {Giovanni Agosta and
                  Alessandro Barenghi and
                  Gerardo Pelosi and
                  Michele Scandale},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Differential Fault Analysis for Block Ciphers: an Automated Conservative
                  Analysis},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {137},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659709},
  doi          = {10.1145/2659651.2659709},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/AgostaBPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AlAhmadA14,
  author       = {Mohammad A. AlAhmad and
                  Imad Fakhri Alshaikhli},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Design and Analysis of a New Hash Function Gear},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {128},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659652},
  doi          = {10.1145/2659651.2659652},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AlAhmadA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AlDabbaghSA14,
  author       = {Sufyan Salim Mahmood AlDabbagh and
                  Imad Fakhri Taha Al Shaikhli and
                  Mohammad A. AlAhmad},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {{HISEC:} {A} New Lightweight Block Cipher Algorithm},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {151},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659662},
  doi          = {10.1145/2659651.2659662},
  timestamp    = {Fri, 09 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AlDabbaghSA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AlamSTC14,
  author       = {Shahid Alam and
                  Ibrahim Sogukpinar and
                  Issa Traor{\'{e}} and
                  Yvonne Coady},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {In-Cloud Malware Analysis and Detection: State of the Art},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {473},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659730},
  doi          = {10.1145/2659651.2659730},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/AlamSTC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AlamTS14,
  author       = {Shahid Alam and
                  Issa Traor{\'{e}} and
                  Ibrahim Sogukpinar},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Current Trends and the Future of Metamorphic Malware Detection},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {411},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659670},
  doi          = {10.1145/2659651.2659670},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/AlamTS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AljahdaliP14,
  author       = {Hani Moaiteq Aljahdali and
                  Ron Poet},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Educated Guessing Attacks on Culturally Familiar Graphical Passwords
                  Using Personal Information on Social Networks},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {272},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659727},
  doi          = {10.1145/2659651.2659727},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AljahdaliP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AljahdaliP14a,
  author       = {Hani Moaiteq Aljahdali and
                  Ron Poet},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Users' Perceptions of Recognition-Based Graphical Passwords: {A} Qualitative
                  Study on Culturally Familiar Graphical Passwords},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {279},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659728},
  doi          = {10.1145/2659651.2659728},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AljahdaliP14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AlmehmadiE14,
  author       = {Abdulaziz Almehmadi and
                  Khalil El{-}Khatib},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {On the Possibility of Insider Threat Detection Using Physiological
                  Signal Monitoring},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {223},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659654},
  doi          = {10.1145/2659651.2659654},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AlmehmadiE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AufnerMHW14,
  author       = {Peter Aufner and
                  Georg Merzdovnik and
                  Markus Huber and
                  Edgar R. Weippl},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Plugin in the Middle - Minimising Security Risks in Mobile Middleware
                  Implementations},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {434},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659689},
  doi          = {10.1145/2659651.2659689},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AufnerMHW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BabenkoMBCT14,
  author       = {Ludmila K. Babenko and
                  Oleg B. Makarevich and
                  Dmitry Bespalov and
                  Roman Chesnokov and
                  Yaroslav Trubnikov},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Instrumental System for Analysis of Information Systems Using Smart
                  Cards Protection},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {339},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659714},
  doi          = {10.1145/2659651.2659714},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/BabenkoMBCT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BarakaT14,
  author       = {Hifaa Bait Baraka and
                  Huaglory Tianfield},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Intrusion Detection System for Cloud Environment},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {399},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659682},
  doi          = {10.1145/2659651.2659682},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/BarakaT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BellekensTARK14,
  author       = {Xavier J. A. Bellekens and
                  Christos Tachtatzis and
                  Robert C. Atkinson and
                  Craig Renfrew and
                  Tony Kirkham},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {GLoP: Enabling Massively Parallel Incident Response Through {GPU}
                  Log Processing},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {295},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659700},
  doi          = {10.1145/2659651.2659700},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/BellekensTARK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BellekensTARK14a,
  author       = {Xavier J. A. Bellekens and
                  Christos Tachtatzis and
                  Robert C. Atkinson and
                  Craig Renfrew and
                  Tony Kirkham},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion
                  Detection Systems},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {302},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659723},
  doi          = {10.1145/2659651.2659723},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/BellekensTARK14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BhattSUCRS14,
  author       = {Parth Bhatt and
                  Johny de Souza and
                  Nelson Uto and
                  Jefferson Capovilla and
                  Jose Resende and
                  Danilo Suiama},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Implementation Aspects of MeterGoat, a Smart Meter Security Training
                  Platform},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {284},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659744},
  doi          = {10.1145/2659651.2659744},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/BhattSUCRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BottazziM14,
  author       = {Giovanni Bottazzi and
                  Gianluigi Me},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {The Botnet Revenue Model},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {459},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659673},
  doi          = {10.1145/2659651.2659673},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/BottazziM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BurtykaM14,
  author       = {Philipp Burtyka and
                  Oleg B. Makarevich},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Symmetric Fully Homomorphic Encryption Using Decidable Matrix Equations},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {186},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659693},
  doi          = {10.1145/2659651.2659693},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/BurtykaM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/CaprinZ14,
  author       = {Edward Caprin and
                  Yan Zhang},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Negotiation Based Framework for Attribute-Based Access Control Policy
                  Evaluation},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {122},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659667},
  doi          = {10.1145/2659651.2659667},
  timestamp    = {Mon, 15 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/CaprinZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/CholezF14,
  author       = {Herv{\'{e}} Cholez and
                  Christophe Feltus},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Towards an Innovative Systemic Approach of Risk Management},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {61},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659734},
  doi          = {10.1145/2659651.2659734},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/CholezF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ChowdhuryM14,
  author       = {Niaz Morshed Chowdhury and
                  Lewis M. Mackenzie},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Development of a Threat Model for Vehicular Ad-hoc Network based Accident
                  Warning Systems},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {447},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659684},
  doi          = {10.1145/2659651.2659684},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/ChowdhuryM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ChowdhuryPM14,
  author       = {Soumyadeb Chowdhury and
                  Ron Poet and
                  Lewis Mackenzie},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Exploring the Guessability of Image Passwords},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {264},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659699},
  doi          = {10.1145/2659651.2659699},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/ChowdhuryPM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ConradS14,
  author       = {Bernd Conrad and
                  Fatemeh Shirazi},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Analyzing the Effectiveness of DoS Attacks on Tor},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {355},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659707},
  doi          = {10.1145/2659651.2659707},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/ConradS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/DuncanW14,
  author       = {Bob Duncan and
                  Mark Whittington},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Compliance with standards, assurance and audit: does this equal security?},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {77},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659711},
  doi          = {10.1145/2659651.2659711},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/DuncanW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/Elci14,
  author       = {Atilla El{\c{c}}i},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Isn't the Time Ripe for a Standard Ontology on Security of Information
                  and Networks?},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2664291},
  doi          = {10.1145/2659651.2664291},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/Elci14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/EvangelopoulouJ14,
  author       = {Maria Evangelopoulou and
                  Christopher W. Johnson},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Implementation of Safety Techniques in a Cyber Domain},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {261},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659740},
  doi          = {10.1145/2659651.2659740},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/EvangelopoulouJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/FeltusNP14,
  author       = {Christophe Feltus and
                  Damien Nicolas and
                  Claude Poupart},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Towards a {HL7} based Metamodeling Integration Approach for Embracing
                  the Privacy of Healthcare Patient Records Administration},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {109},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659674},
  doi          = {10.1145/2659651.2659674},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/FeltusNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/FerdousNP14,
  author       = {Md. Sadek Ferdous and
                  Gethin Norman and
                  Ron Poet},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Mathematical Modelling of Identity, Identity Management and Other
                  Related Topics},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {9},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659729},
  doi          = {10.1145/2659651.2659729},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/FerdousNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/GandotraBS14,
  author       = {Ekta Gandotra and
                  Divya Bansal and
                  Sanjeev Sofat},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Integrated Framework for Classification of Malwares},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {417},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659738},
  doi          = {10.1145/2659651.2659738},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/GandotraBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/GargPGLL14,
  author       = {Nishant Garg and
                  Kuldeep Pareek and
                  Manoj Singh Gaur and
                  Vijay Laxmi and
                  Chhagan Lal},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Analysis of Identity Forging Attack in MANETs},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {441},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659694},
  doi          = {10.1145/2659651.2659694},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/GargPGLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/GarkushaAM14,
  author       = {Artem Garkusha and
                  Evgeny Sergeevich Abramov and
                  Oleg B. Makarevich},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {An effectiveness of application of {\textless}{\textless}Capture The
                  Flag{\textgreater}{\textgreater} competitions concept within higher
                  education (Student contribution)},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {43},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659732},
  doi          = {10.1145/2659651.2659732},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/GarkushaAM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/GohPVCKLE14,
  author       = {Alwyn Goh and
                  Geong Sen Poh and
                  Voon{-}Yee Vee and
                  Kok Boon Chong and
                  Xin Zhe Khooi and
                  Chanan Zhuo Ern Loh and
                  Zhi Yuan Eng},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Human Visualisation of Cryptographic Code Using Progressive Multi-Scale
                  Resolution},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {170},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659677},
  doi          = {10.1145/2659651.2659677},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/GohPVCKLE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/Gudymenko14,
  author       = {Ivan Gudymenko},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {A Privacy-Preserving E-Ticketing System for Public Transportation
                  Supporting Fine-Granular Billing and Local Validation},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {101},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659706},
  doi          = {10.1145/2659651.2659706},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/Gudymenko14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/HochreinerHMW14,
  author       = {Christoph Hochreiner and
                  Markus Huber and
                  Georg Merzdovnik and
                  Edgar R. Weippl},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Towards Practical Methods to Protect the Privacy of Location Information
                  with Mobile Devices},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {17},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659680},
  doi          = {10.1145/2659651.2659680},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/HochreinerHMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/HonarvarS14,
  author       = {Ali Reza Honarvar and
                  Ashkan Sami},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {{CBR} Clone Based Software Flaw Detection Issues},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {487},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659745},
  doi          = {10.1145/2659651.2659745},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/HonarvarS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/JaimanS14,
  author       = {Vikas Jaiman and
                  Gaurav Somani},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {An Order Preserving Encryption Scheme for Cloud Computing},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {211},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659678},
  doi          = {10.1145/2659651.2659678},
  timestamp    = {Thu, 14 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/JaimanS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KhanKRA14,
  author       = {Fawad Khan and
                  Sarmad Ullah Khan and
                  Muhammad Roman and
                  Muhammad Usman Abbasi},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Location Identity Based Content Security Scheme for Content Centric
                  Networking},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {95},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659713},
  doi          = {10.1145/2659651.2659713},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/KhanKRA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KlinecM14,
  author       = {Dusan Klinec and
                  Vashek Maty{\'{a}}s},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Traversing symmetric {NAT} with predictable port allocation},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {543},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659698},
  doi          = {10.1145/2659651.2659698},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/KlinecM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KucuksilleYU14,
  author       = {Ecir U. K{\"{u}}{\c{c}}{\"{u}}ksille and
                  Mehmet Ali Yal{\c{c}}inkaya and
                  Ozan U{\c{c}}ar},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Physical Dangers in the Cyber Security and Precautions to be Taken},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {310},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659731},
  doi          = {10.1145/2659651.2659731},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/KucuksilleYU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KumarKG14,
  author       = {Rahul Kumar and
                  Indraveni K and
                  Aakash Kumar Goel},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Automated Session Fixation Vulnerability Detection in Web Applications
                  using the Set-Cookie {HTTP} response header in cookies},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {351},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659718},
  doi          = {10.1145/2659651.2659718},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/KumarKG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KuriakoseP14,
  author       = {Jikku Kuriakose and
                  Vinod P.},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Towards the Detection of Undetectable Metamorphic Malware},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {373},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659715},
  doi          = {10.1145/2659651.2659715},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/KuriakoseP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/LahmerZ14,
  author       = {Ibrahim Lahmer and
                  Ning Zhang},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {MapReduce: {MR} Model Abstraction for Future Security Study},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {392},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659722},
  doi          = {10.1145/2659651.2659722},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/LahmerZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/LinSKI14,
  author       = {Hui Lin and
                  Adam J. Slagell and
                  Zbigniew T. Kalbarczyk and
                  Ravishankar K. Iyer},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Semantic Security Analysis of {SCADA} Networks to Detect Malicious
                  Control Commands in Power Grids (Poster)},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {492},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659746},
  doi          = {10.1145/2659651.2659746},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/LinSKI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/MalyukM14,
  author       = {Anatoly Malyuk and
                  Natalia G. Miloslavskaya},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Information Security Theory Development},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {52},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659659},
  doi          = {10.1145/2659651.2659659},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/MalyukM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/MayerA14,
  author       = {Nicolas Mayer and
                  Jocelyn Aubert},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Sector-Specific Tool for Information Security Risk Management in the
                  Context of Telecommunications Regulation (Tool demo)},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {85},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659665},
  doi          = {10.1145/2659651.2659665},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/MayerA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/MiloslavskayaSTZ14,
  author       = {Natalia G. Miloslavskaya and
                  Mikhail Senatorov and
                  Alexander I. Tolstoy and
                  Sergey Zapechnikov},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Big Data Information Security Maintenance},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {89},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659655},
  doi          = {10.1145/2659651.2659655},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/MiloslavskayaSTZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/MondalB14,
  author       = {Soumik Mondal and
                  Patrick Bours},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Continuous Authentication using Fuzzy Logic},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {231},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659720},
  doi          = {10.1145/2659651.2659720},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/MondalB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/NavalLGGR14,
  author       = {Smita Naval and
                  Vijay Laxmi and
                  Neha Gupta and
                  Manoj Singh Gaur and
                  Muttukrishnan Rajarajan},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Exploring Worm Behaviors using {DTW}},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {379},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659737},
  doi          = {10.1145/2659651.2659737},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/NavalLGGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/O14,
  author       = {Valeriy O. Osipyan},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Mathematical model of the polyalphabetic information security system
                  based on the normal generalized knapsack},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {180},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659658},
  doi          = {10.1145/2659651.2659658},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/O14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/PaulI14,
  author       = {Greig Paul and
                  James Irvine},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {A Protocol For Storage Limitations and Upgrades in Decentralised Networks},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {69},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659724},
  doi          = {10.1145/2659651.2659724},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/PaulI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/PaulI14a,
  author       = {Greig Paul and
                  James Irvine},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Privacy Implications of Wearable Health Devices},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {117},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659683},
  doi          = {10.1145/2659651.2659683},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/PaulI14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/PfefferHS14,
  author       = {Tobias F. Pfeffer and
                  Paula Herber and
                  J{\"{o}}rg Schneider},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Reverse Engineering of {ARM} Binaries Using Formal Transformations},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {345},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659697},
  doi          = {10.1145/2659651.2659697},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/PfefferHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/PisarcikS14,
  author       = {Peter Pisarc{\'{\i}}k and
                  Pavol Sokol},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Framework for distributed virtual honeynets},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {324},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659685},
  doi          = {10.1145/2659651.2659685},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/PisarcikS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/PuttarooKA14,
  author       = {Mohammad Puttaroo and
                  Peter Komisarczuk and
                  Renato Cordeiro de Amorim},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Challenges in developing Capture-HPC exclusion lists},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {334},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659717},
  doi          = {10.1145/2659651.2659717},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/PuttarooKA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/RahulamathavanPBRRS14,
  author       = {Yogachandran Rahulamathavan and
                  Pramod S. Pawar and
                  Pete Burnap and
                  Muttukrishnan Rajarajan and
                  Omer F. Rana and
                  George Spanoudakis},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Analysing Security requirements in Cloud-based Service Level Agreements},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {73},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659735},
  doi          = {10.1145/2659651.2659735},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/RahulamathavanPBRRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/RajaRBM14,
  author       = {Kiran B. Raja and
                  Ramachandra Raghavendra and
                  Christoph Busch and
                  Soumik Mondal},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {An Empirical Study of Smartphone Based Iris Recognition in Visible
                  Spectrum},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {239},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659704},
  doi          = {10.1145/2659651.2659704},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/RajaRBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/RamliD14,
  author       = {Ahmad Kamal Ramli and
                  Karim Djemame},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Autonomic management for convergent networks to support robustness
                  of appliance technologies},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {47},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2660516},
  doi          = {10.1145/2659651.2660516},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/RamliD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/RjaibiR14,
  author       = {Neila Rjaibi and
                  Latifa Ben Arfa Rabai},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Deploying Suitable Countermeasures to Solve the Security Problems
                  within an E-learning Environment},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {33},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659721},
  doi          = {10.1145/2659651.2659721},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/RjaibiR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/SaeedAJB14,
  author       = {Ahmed Saeed and
                  Ali Ahmadinia and
                  Mike Just and
                  Christophe Bobda},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {An {ID} and Address Protection Unit for NoC based Communication Architectures},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {288},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659719},
  doi          = {10.1145/2659651.2659719},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/SaeedAJB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/SainiGBS14,
  author       = {Ashish Saini and
                  Ekta Gandotra and
                  Divya Bansal and
                  Sanjeev Sofat},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Classification of {PE} Files using Static Analysis},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {429},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659679},
  doi          = {10.1145/2659651.2659679},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/SainiGBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/SairamKB14,
  author       = {Ashok Singh Sairam and
                  Rahul Kumar and
                  Pratima Biswas},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Implementation of an Adaptive Traffic-aware Firewall},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {385},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659739},
  doi          = {10.1145/2659651.2659739},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/SairamKB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/SarrisMC14,
  author       = {Paraskevas Sarris and
                  Lewis Mackenzie and
                  Soumyadeb Chowdhury},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {A Novel Authentication Scheme for Online Transactions},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {483},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659743},
  doi          = {10.1145/2659651.2659743},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/SarrisMC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ShahriarH14,
  author       = {Hossain Shahriar and
                  Hisham M. Haddad},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Content Provider Leakage Vulnerability Detection in Android Applications},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {359},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659716},
  doi          = {10.1145/2659651.2659716},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/ShahriarH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/Sharbaf14,
  author       = {Mehrdad Sepehri Sharbaf},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {A New Perspective to Information Security: Total Quality Information
                  Security Management},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {56},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659666},
  doi          = {10.1145/2659651.2659666},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/Sharbaf14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/SharmaK14,
  author       = {Avani Sharma and
                  Rajbir Kaur},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Non-cryptographic Detection Approach and Countermeasure for {JFDV}
                  Attack},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {367},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659657},
  doi          = {10.1145/2659651.2659657},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/SharmaK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/Sheykhkanloo14,
  author       = {Naghmeh Moradpoor Sheykhkanloo},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Employing Neural Networks for the Detection of {SQL} Injection Attack},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {318},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659675},
  doi          = {10.1145/2659651.2659675},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/Sheykhkanloo14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/SinghBS14,
  author       = {Amardeep Singh and
                  Divya Bansal and
                  Sanjeev Sofat},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {An Approach of Privacy Preserving based Publishing in Twitter},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {39},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659733},
  doi          = {10.1145/2659651.2659733},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/SinghBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/SinghBS14a,
  author       = {Monika Singh and
                  Divya Bansal and
                  Sanjeev Sofat},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Detecting Malicious Users in Twitter using Classifiers},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {247},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659736},
  doi          = {10.1145/2659651.2659736},
  timestamp    = {Mon, 28 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/SinghBS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/SoederB14,
  author       = {Brian A. Soeder and
                  K. Suzanne Barber},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Trustworthiness of Identity Attributes},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {4},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659708},
  doi          = {10.1145/2659651.2659708},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/SoederB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/StepanovaZ14,
  author       = {Tatiana V. Stepanova and
                  Dmitry P. Zegzhda},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Applying Large-scale Adaptive Graphs to Modeling Internet of Things
                  Security},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {479},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659696},
  doi          = {10.1145/2659651.2659696},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/StepanovaZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/TezcanTD14,
  author       = {Cihangir Tezcan and
                  Halil Kemal Taskin and
                  Murat Demircioglu},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Improbable Differential Attacks on Serpent using Undisturbed Bits},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {145},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659660},
  doi          = {10.1145/2659651.2659660},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/TezcanTD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/Tiloca14,
  author       = {Marco Tiloca},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Efficient Protection of Response Messages in DTLS-Based Secure Multicast
                  Communication},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {466},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659668},
  doi          = {10.1145/2659651.2659668},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/Tiloca14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/Trepacheva14,
  author       = {Alina Trepacheva},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Cryptanalysis of Polynomial based Homomorphic Encryption},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {205},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659712},
  doi          = {10.1145/2659651.2659712},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/Trepacheva14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/TrepachevaB14,
  author       = {Alina Trepacheva and
                  Liudmila Babenko},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Known Plaintexts Attack on Polynomial based Homomorphic Encryption},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {157},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659692},
  doi          = {10.1145/2659651.2659692},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/TrepachevaB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/UnalS14,
  author       = {Ecem {\"{U}}nal and
                  Erkay Savas},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Bandwidth-Optimized Parallel Private Information Retrieval},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {197},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659702},
  doi          = {10.1145/2659651.2659702},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/UnalS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/VasilomanolakisKMF14,
  author       = {Emmanouil Vasilomanolakis and
                  Shankar Karuppayah and
                  Max M{\"{u}}hlh{\"{a}}user and
                  Mathias Fischer},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {HosTaGe: a Mobile Honeypot for Collaborative Defense},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {330},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659663},
  doi          = {10.1145/2659651.2659663},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/VasilomanolakisKMF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/VorakulpipatPS14,
  author       = {Chalee Vorakulpipat and
                  Chantri Polprasert and
                  Siwaruk Siwamogsatham},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Managing Mobile Device Security in Critical Infrastructure Sectors},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {65},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659742},
  doi          = {10.1145/2659651.2659742},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/VorakulpipatPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/WeldemariamSD14,
  author       = {Komminist Weldemariam and
                  Hossain Shahriar and
                  Vamshee Krishna Devendran},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Dynamic Analysis of Web Objects},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {423},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659671},
  doi          = {10.1145/2659651.2659671},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/WeldemariamSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/WinTMSR14,
  author       = {Thu Yein Win and
                  Huaglory Tianfield and
                  Quentin Mair and
                  Taimur Al Said and
                  Omer F. Rana},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Virtual Machine Introspection},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {405},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659710},
  doi          = {10.1145/2659651.2659710},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/WinTMSR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ZanjaniAC14,
  author       = {Maryam Farajzadeh{-}Zanjani and
                  Seyed Masoud Alavi Abhari and
                  Alexander G. Chefranov},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Group Key Exchange Protocol Based on Diffie-Hellman Technique in Ad-Hoc
                  Network},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {166},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659725},
  doi          = {10.1145/2659651.2659725},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/ZanjaniAC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sin/2014,
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2659651},
  isbn         = {978-1-4503-3033-6},
  timestamp    = {Fri, 12 Dec 2014 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics