default search action
Search dblp for Publications
export results for "stream:conf/mmmacns:"
@inproceedings{DBLP:conf/mmmacns/BraekenBTV17, author = {An Braeken and Sergey Bezzateev and Abdellah Touhafi and Natalia Voloshina}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {{HEPPA:} Highly Efficient Privacy Preserving Authentication for {ITS}}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {260--271}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_21}, doi = {10.1007/978-3-319-65127-9\_21}, timestamp = {Thu, 14 Oct 2021 10:27:55 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/BraekenBTV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/BranitskiyK17, author = {Alexander Branitskiy and Igor V. Kotenko}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Network Anomaly Detection Based on an Ensemble of Adaptive Binary Classifiers}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {143--157}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_12}, doi = {10.1007/978-3-319-65127-9\_12}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/BranitskiyK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DavisKDS17, author = {Matthew Davis and Emrah Korkmaz and Andrey M. Dolgikh and Victor A. Skormin}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Resident Security System for Government/Industry Owned Computers}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {185--194}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_15}, doi = {10.1007/978-3-319-65127-9\_15}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DavisKDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DongY0L017, author = {Qi Dong and Zekun Yang and Yu Chen and Xiaohua Li and Kai Zeng}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {247--259}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_20}, doi = {10.1007/978-3-319-65127-9\_20}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DongY0L017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DragerZ17, author = {Steven Drager and Janusz Zalewski}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {A Novel and Unifying View of Trustworthiness in Cyberphysical Systems}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {327--338}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_26}, doi = {10.1007/978-3-319-65127-9\_26}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/DragerZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GkioulosW17, author = {Vasileios Gkioulos and Stephen D. Wolthusen}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Security Requirements for the Deployment of Services Across Tactical {SOA}}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {115--127}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_10}, doi = {10.1007/978-3-319-65127-9\_10}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GkioulosW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GorskiL17, author = {Janusz G{\'{o}}rski and Katarzyna Lukasiewicz}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {3--15}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_1}, doi = {10.1007/978-3-319-65127-9\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GorskiL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Grusho17, author = {Alexander A. Grusho}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Data Mining and Information Security}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {28--33}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_3}, doi = {10.1007/978-3-319-65127-9\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/Grusho17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GrushoGZZT17, author = {Alexander A. Grusho and Nick A. Grusho and Michael I. Zabezhailo and Alexander Zatsarinny and Elena E. Timonina}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Information Security of {SDN} on the Basis of Meta Data}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {339--347}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_27}, doi = {10.1007/978-3-319-65127-9\_27}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GrushoGZZT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Hutchison17, author = {Andrew Hutchison}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {16--27}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_2}, doi = {10.1007/978-3-319-65127-9\_2}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Hutchison17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/IraqiB17, author = {Omar Iraqi and Hanan El Bakkali}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Toward Third-Party Immune Applications}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {348--359}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_28}, doi = {10.1007/978-3-319-65127-9\_28}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/IraqiB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KolomeecGDCKD17, author = {Maxim Kolomeec and Gustavo {Gonzalez Granadillo} and Elena Doynikova and Andrey Chechulin and Igor V. Kotenko and Herv{\'{e}} Debar}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Choosing Models for Security Metrics Visualization}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {75--87}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_7}, doi = {10.1007/978-3-319-65127-9\_7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/KolomeecGDCKD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KonorskiR17, author = {Jerzy Konorski and Karol Rydzewski}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation System}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {131--142}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_11}, doi = {10.1007/978-3-319-65127-9\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KonorskiR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KopeikinTTS17, author = {Anton Kopeikin and Arnur G. Tokhtabayev and Nurlan Tashatov and Dina Satybaldina}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {tLab: {A} System Enabling Malware Clustering Based on Suspicious Activity Trees}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {195--210}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_16}, doi = {10.1007/978-3-319-65127-9\_16}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/KopeikinTTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KorkmazDDS17, author = {Emrah Korkmaz and Matthew Davis and Andrey M. Dolgikh and Victor A. Skormin}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {62--74}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_6}, doi = {10.1007/978-3-319-65127-9\_6}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KorkmazDDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KorzhikFGM17, author = {Valery I. Korzhik and Ivan Fedyanin and Artur Godlewski and Guillermo Morales{-}Luna}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Steganalysis Based on Statistical Properties of the Encrypted Messages}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {288--298}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_23}, doi = {10.1007/978-3-319-65127-9\_23}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KorzhikFGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/LemaireVDN17, author = {Laurens Lemaire and Jan Vossaert and Bart De Decker and Vincent Naessens}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Extending {FAST-CPS} for the Analysis of Data Flows in Cyber-Physical Systems}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {37--49}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_4}, doi = {10.1007/978-3-319-65127-9\_4}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/LemaireVDN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MavroeidisN17, author = {Vasileios Mavroeidis and Mathew Nicho}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Quick Response Code Secure: {A} Cryptographically Secure Anti-Phishing Tool for {QR} Code Attacks}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {313--324}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_25}, doi = {10.1007/978-3-319-65127-9\_25}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MavroeidisN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MetereD17, author = {Roberto Metere and Changyu Dong}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Automated Cryptographic Analysis of the Pedersen Commitment Scheme}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {275--287}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_22}, doi = {10.1007/978-3-319-65127-9\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/MetereD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MjolsnesO17, author = {Stig Fr. Mj{\o}lsnes and Ruxandra F. Olimid}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Easy 4G/LTE {IMSI} Catchers for Non-Programmers}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {235--246}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_19}, doi = {10.1007/978-3-319-65127-9\_19}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MjolsnesO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/NagothuD17, author = {Deeraj Nagothu and Andrey M. Dolgikh}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {iCrawl: {A} Visual High Interaction Web Crawler}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {91--103}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_8}, doi = {10.1007/978-3-319-65127-9\_8}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/NagothuD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/NiemiecF17, author = {Marcin Niemiec and Maciej Francikiewicz}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Security Assessment of Cryptographic Algorithms}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {299--312}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_24}, doi = {10.1007/978-3-319-65127-9\_24}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/NiemiecF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/NovikovaM17, author = {Evgenia Novikova and Ivan Murenin}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {50--61}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_5}, doi = {10.1007/978-3-319-65127-9\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/NovikovaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/OstapA17, author = {Hubert Ostap and Ryszard Antkiewicz}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {A Concept of Clustering-Based Method for Botnet Detection}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {223--234}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_18}, doi = {10.1007/978-3-319-65127-9\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/OstapA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/PopyackB17, author = {Leonard J. Popyack and Jay Biernat}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Race Condition Faults in Multi-core Systems}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {104--114}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_9}, doi = {10.1007/978-3-319-65127-9\_9}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/PopyackB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SitekK17, author = {Albert Sitek and Zbigniew Kotulski}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Cardholder's Reputation System for Contextual Risk Management in Payment Transactions}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {158--170}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_13}, doi = {10.1007/978-3-319-65127-9\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/SitekK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ThanigaivelanNV17, author = {Nanda Kumar Thanigaivelan and Ethiopia Nigussie and Seppo Virtanen and Jouni Isoaho}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Towards Self-aware Approach for Mobile Devices Security}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {171--182}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_14}, doi = {10.1007/978-3-319-65127-9\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/ThanigaivelanNV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/TokhtabayevKTS17, author = {Arnur G. Tokhtabayev and Anton Kopeikin and Nurlan Tashatov and Dina Satybaldina}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Malware Analysis and Detection via Activity Trees in User-Dependent Environment}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {211--222}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_17}, doi = {10.1007/978-3-319-65127-9\_17}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/TokhtabayevKTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmmacns/2017, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9}, doi = {10.1007/978-3-319-65127-9}, isbn = {978-3-319-65126-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/AvanesovCRT12, author = {Tigran Avanesov and Yannick Chevalier and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Towards the Orchestration of Secured Services under Non-disclosure Policies}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {130--145}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_12}, doi = {10.1007/978-3-642-33704-8\_12}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/AvanesovCRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/CadenheadKKT12, author = {Tyrone Cadenhead and Murat Kantarcioglu and Vaibhav Khadilkar and Bhavani Thuraisingham}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Design and Implementation of a Cloud-Based Assured Information Sharing System}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {36--50}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_4}, doi = {10.1007/978-3-642-33704-8\_4}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/CadenheadKKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ChechulinKD12, author = {Andrey Chechulin and Igor V. Kotenko and Vasily Desnitsky}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {An Approach for Network Information Flow Analysis for Systems of Embedded Components}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {146--155}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_13}, doi = {10.1007/978-3-642-33704-8\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ChechulinKD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DesharnaisKT12, author = {Jos{\'{e}}e Desharnais and Erwanne P. Kanyabwero and Nadia Tawbi}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Enforcing Information Flow Policies by a Three-Valued Analysis}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {114--129}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_11}, doi = {10.1007/978-3-642-33704-8\_11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DesharnaisKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DesnitskyKC12, author = {Vasily Desnitsky and Igor V. Kotenko and Andrey Chechulin}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Configuration-Based Approach to Embedded Device Security}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {270--285}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_23}, doi = {10.1007/978-3-642-33704-8\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DesnitskyKC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DiniMSS12, author = {Gianluca Dini and Fabio Martinelli and Andrea Saracino and Daniele Sgandurra}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {{MADAM:} {A} Multi-level Anomaly Detector for Android Malware}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {240--253}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_21}, doi = {10.1007/978-3-642-33704-8\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DiniMSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DolgikhNSB12, author = {Andrey M. Dolgikh and Tomas Nykodym and Victor A. Skormin and Zachary Birnbaum}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {191--202}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_17}, doi = {10.1007/978-3-642-33704-8\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DolgikhNSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GranadilloDJGA12, author = {Gustavo {Gonzalez Granadillo} and Herv{\'{e}} Debar and Gr{\'{e}}goire Jacob and Chrystel Gaber and Mohammed Achemlal}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Individual Countermeasure Selection Based on the Return On Response Investment Index}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {156--170}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_14}, doi = {10.1007/978-3-642-33704-8\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GranadilloDJGA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GrushoGT12, author = {Alexander A. Grusho and Nikolai A. Grusho and Elena E. Timonina}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Alternative Mechanisms for Information Security}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {108--113}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_10}, doi = {10.1007/978-3-642-33704-8\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GrushoGT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/JinSK12, author = {Xin Jin and Ravi S. Sandhu and Ram Krishnan}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {{RABAC:} Role-Centric Attribute-Based Access Control}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {84--96}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_8}, doi = {10.1007/978-3-642-33704-8\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/JinSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KerriganC12, author = {Brendan Kerrigan and Yu Chen}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {286--298}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_24}, doi = {10.1007/978-3-642-33704-8\_24}, timestamp = {Thu, 10 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KerriganC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KomashinskiyK12, author = {Dmitriy Komashinskiy and Igor V. Kotenko}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {254--269}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_22}, doi = {10.1007/978-3-642-33704-8\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KomashinskiyK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Livshits12, author = {Benjamin Livshits}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Finding Malware on a Web Scale}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {1--2}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_1}, doi = {10.1007/978-3-642-33704-8\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Livshits12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MartinelliMM12, author = {Fabio Martinelli and Ilaria Matteucci and Charles Morisset}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {From Qualitative to Quantitative Enforcement of Security Policy}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {22--35}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_3}, doi = {10.1007/978-3-642-33704-8\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MartinelliMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MoldovyanMN12, author = {Alexander A. Moldovyan and Nikolay A. Moldovyan and Evgenia Novikova}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Blind 384-bit Digital Signature Scheme}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {77--83}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_7}, doi = {10.1007/978-3-642-33704-8\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MoldovyanMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MustaphaDJ12, author = {Yosra Ben Mustapha and Herv{\'{e}} Debar and Gr{\'{e}}goire Jacob}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {203--217}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_18}, doi = {10.1007/978-3-642-33704-8\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MustaphaDJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Oleshchuk12, author = {Vladimir A. Oleshchuk}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Trust-Aware {RBAC}}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {97--107}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_9}, doi = {10.1007/978-3-642-33704-8\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Oleshchuk12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/RiekeCHPG12, author = {Roland Rieke and Luigi Coppolino and Andrew Hutchison and Elsa Prieto and Chrystel Gaber}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Security and Reliability Requirements for Advanced Security Event Management}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {171--180}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_15}, doi = {10.1007/978-3-642-33704-8\_15}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/RiekeCHPG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SchutteRW12, author = {Julian Sch{\"{u}}tte and Roland Rieke and Timo Winkelvos}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Model-Based Security Event Management}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {181--190}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_16}, doi = {10.1007/978-3-642-33704-8\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SchutteRW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/TsayM12, author = {Joe{-}Kai Tsay and Stig Fr. Mj{\o}lsnes}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {A Vulnerability in the {UMTS} and {LTE} Authentication and Key Agreement Protocols}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {65--76}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_6}, doi = {10.1007/978-3-642-33704-8\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/TsayM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/WangJMS12, author = {Zhaohui Wang and Ryan Johnson and Rahul Murmuria and Angelos Stavrou}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Exposing Security Risks for Commercial Mobile Devices}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {3--21}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_2}, doi = {10.1007/978-3-642-33704-8\_2}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/WangJMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/YakovlevKBM12, author = {Viktor Yakovlev and Valery I. Korzhik and Mihail Bakaev and Guillermo Morales{-}Luna}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {51--64}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_5}, doi = {10.1007/978-3-642-33704-8\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/YakovlevKBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/YavvariTRS12, author = {Chaitanya Yavvari and Arnur G. Tokhtabayev and Huzefa Rangwala and Angelos Stavrou}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Malware Characterization Using Behavioral Components}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {226--239}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_20}, doi = {10.1007/978-3-642-33704-8\_20}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/YavvariTRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZegzhdaS12, author = {Dmitry P. Zegzhda and Tatiana V. Stepanova}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {218--225}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_19}, doi = {10.1007/978-3-642-33704-8\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ZegzhdaS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZKK12, author = {Peter D. Zegzhda and Dmitry P. Zegzhda and Maxim O. Kalinin and Artem S. Konoplev}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Security Modeling of Grid Systems Using Petri Nets}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {299--308}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_25}, doi = {10.1007/978-3-642-33704-8\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZN12, author = {Peter D. Zegzhda and Dmitry P. Zegzhda and Alexey V. Nikolskiy}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Using Graph Theory for Cloud System Security Modeling}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {309--318}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_26}, doi = {10.1007/978-3-642-33704-8\_26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmmacns/2012, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8}, doi = {10.1007/978-3-642-33704-8}, isbn = {978-3-642-33703-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/BensonCCJO10, author = {Glenn S. Benson and Shiu{-}Kai Chin and Sean Croston and Karthick Jayaraman and Susan Older}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Credentials Management for High-Value Transactions}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {169--182}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_13}, doi = {10.1007/978-3-642-14706-7\_13}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/BensonCCJO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ChinMOV10, author = {Shiu{-}Kai Chin and Sarah Muccio and Susan Older and Thomas N. J. Vestal}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Policy-Based Design and Verification for Mission Assurance}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {125--138}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_10}, doi = {10.1007/978-3-642-14706-7\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ChinMOV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DebarKCC10, author = {Herv{\'{e}} Debar and Nizar Kheir and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Service Dependencies in Information Systems Security}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {1--20}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_1}, doi = {10.1007/978-3-642-14706-7\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/DebarKCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DesnitskyK10, author = {Vasily Desnitsky and Igor V. Kotenko}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Security and Scalability of Remote Entrusting Protection}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {298--306}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_23}, doi = {10.1007/978-3-642-14706-7\_23}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DesnitskyK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DomnitserAP10, author = {Leonid Domnitser and Nael B. Abu{-}Ghazaleh and Dmitry Ponomarev}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {70--85}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_6}, doi = {10.1007/978-3-642-14706-7\_6}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DomnitserAP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Gollmann10, author = {Dieter Gollmann}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Secure Applications without Secure Infrastructures}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {21--31}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_2}, doi = {10.1007/978-3-642-14706-7\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Gollmann10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GrushoGT10, author = {Alexander A. Grusho and Nikolai A. Grusho and Elena E. Timonina}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Problems of Modeling in the Analysis of Covert Channels}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {118--124}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_9}, doi = {10.1007/978-3-642-14706-7\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GrushoGT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KhouryT10, author = {Rapha{\"{e}}l Khoury and Nadia Tawbi}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Using Equivalence Relations for Corrective Enforcement of Security Policies}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {139--154}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_11}, doi = {10.1007/978-3-642-14706-7\_11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KhouryT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KraxbergerDH10, author = {Stefan Kraxberger and Peter Danner and Daniel M. Hein}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Secure Multi-Agent System for Multi-Hop Environments}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {270--283}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_21}, doi = {10.1007/978-3-642-14706-7\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KraxbergerDH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MarkovK10, author = {Yaroslav A. Markov and Maxim O. Kalinin}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Intellectual Intrusion Detection with Sequences Alignment Methods}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {217--228}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_17}, doi = {10.1007/978-3-642-14706-7\_17}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MarkovK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MoldovyanM10, author = {Dmitriy N. Moldovyan and Nikolay A. Moldovyan}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {183--194}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_14}, doi = {10.1007/978-3-642-14706-7\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MoldovyanM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MoliszR10, author = {Wojciech Molisz and Jacek Rak}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in {IP-MPLS/WDM} Networks}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {307--320}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_24}, doi = {10.1007/978-3-642-14706-7\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MoliszR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MoralesKXS10, author = {Jose Andre Morales and Erhan J. Kartaltepe and Shouhuai Xu and Ravi S. Sandhu}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Symptoms-Based Detection of Bot Processes}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {229--241}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_18}, doi = {10.1007/978-3-642-14706-7\_18}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MoralesKXS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Morrisett10, author = {Greg Morrisett}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Integrating Types and Specifications for Secure Software Development}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {32--35}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_3}, doi = {10.1007/978-3-642-14706-7\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Morrisett10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MunozMA10, author = {Antonio Mu{\~{n}}oz and Antonio Ma{\~{n}}a and Pablo Ant{\'{o}}n}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {In the Track of the Agent Protection: {A} Solution Based on Cryptographic Hardware}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {284--297}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_22}, doi = {10.1007/978-3-642-14706-7\_22}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/MunozMA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/NguyenPF10, author = {Hai Thanh Nguyen and Slobodan Petrovic and Katrin Franke}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {A Comparison of Feature-Selection Methods for Intrusion Detection}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {242--255}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_19}, doi = {10.1007/978-3-642-14706-7\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/NguyenPF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Pietre-CambacedesB10, author = {Ludovic Pi{\`{e}}tre{-}Cambac{\'{e}}d{\`{e}}s and Marc Bouissou}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Attack and Defense Modeling with {BDMP}}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {86--101}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_7}, doi = {10.1007/978-3-642-14706-7\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Pietre-CambacedesB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Preneel10, author = {Bart Preneel}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Cryptography for Network Security: Failures, Successes and Challenges}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {36--54}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_4}, doi = {10.1007/978-3-642-14706-7\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Preneel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/RiekeS10, author = {Roland Rieke and Zaharina Stoynova}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Predictive Security Analysis for Event-Driven Processes}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {321--328}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_25}, doi = {10.1007/978-3-642-14706-7\_25}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/RiekeS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Sacha10, author = {Krzysztof Sacha}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Credential Chain Discovery in RT\({}^{\mbox{T}}\) Trust Management Language}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {195--208}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_15}, doi = {10.1007/978-3-642-14706-7\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Sacha10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SaenkoK10, author = {Igor Saenko and Igor V. Kotenko}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Genetic Optimization of Access Control Schemes in Virtual Local Area Networks}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {209--216}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_16}, doi = {10.1007/978-3-642-14706-7\_16}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/SaenkoK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SandhuKNW10, author = {Ravi S. Sandhu and Ram Krishnan and Jianwei Niu and William H. Winsborough}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Group-Centric Models for Secure and Agile Information Sharing}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {55--69}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_5}, doi = {10.1007/978-3-642-14706-7\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SandhuKNW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SankaranarayananUK10, author = {Vidyaraman Sankaranarayanan and Shambhu J. Upadhyaya and Kevin A. Kwiat}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {102--117}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_8}, doi = {10.1007/978-3-642-14706-7\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SankaranarayananUK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/TeuflPL10, author = {Peter Teufl and Udo Payer and Guenther Lackner}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {From {NLP} (Natural Language Processing) to {MLP} (Machine Language Processing)}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {256--269}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_20}, doi = {10.1007/978-3-642-14706-7\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/TeuflPL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/UnalAC10, author = {Devrim Unal and Ozan Akar and M. Ufuk {\c{C}}aglayan}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {155--168}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_12}, doi = {10.1007/978-3-642-14706-7\_12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/UnalAC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZegzhdaR10, author = {Dmitry P. Zegzhda and Ekaterina Rudina}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Virtual Environment Security Modeling}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {329--336}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_26}, doi = {10.1007/978-3-642-14706-7\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ZegzhdaR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZK10, author = {Dmitry P. Zegzhda and Peter D. Zegzhda and Maxim O. Kalinin}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Clarifying Integrity Control at the Trusted Information Environment}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {337--344}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_27}, doi = {10.1007/978-3-642-14706-7\_27}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmmacns/2010, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7}, doi = {10.1007/978-3-642-14706-7}, isbn = {978-3-642-14705-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/AfinidadLIN05, author = {Francis B. Afinidad and Timothy E. Levin and Cynthia E. Irvine and Thuy D. Nguyen}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Foundation for a Time Interval Access Control Model}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {406--411}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_31}, doi = {10.1007/11560326\_31}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/AfinidadLIN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/AlharbyI05, author = {Abdulrahman Alharby and Hideki Imai}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Hybrid Intrusion Detection Model Based on Ordered Sequences}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {352--365}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_27}, doi = {10.1007/11560326\_27}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/AlharbyI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/BaiardiT05, author = {Fabrizio Baiardi and Claudio Telmon}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {298--310}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_23}, doi = {10.1007/11560326\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/BaiardiT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/BalbianiC05, author = {Philippe Balbiani and Fahima Cheikh}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Safety Problems in Access Control with Temporal Constraints}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {165--178}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_13}, doi = {10.1007/11560326\_13}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/BalbianiC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/BeauquierDM05, author = {Dani{\`{e}}le Beauquier and Marie Duflot and Marius Minea}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {A Probabilistic Property-Specific Approach to Information Flow}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {206--220}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_16}, doi = {10.1007/11560326\_16}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/BeauquierDM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Buell05, author = {Duncan A. Buell}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Calibrating Entropy Functions Applied to Computer Networks}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {76--87}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_6}, doi = {10.1007/11560326\_6}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Buell05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ButtsMB05, author = {Jonathan W. Butts and Robert F. Mills and Rusty O. Baldwin}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Developing an Insider Threat Model Using Functional Decomposition}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {412--417}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_32}, doi = {10.1007/11560326\_32}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ButtsMB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ClementePG05, author = {F{\'{e}}lix J. Garc{\'{\i}}a Clemente and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {An XML-Seamless Policy Based Management Framework}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {418--423}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_33}, doi = {10.1007/11560326\_33}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/ClementePG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ClementeRPG05, author = {F{\'{e}}lix J. Garc{\'{\i}}a Clemente and Jes{\'{u}}s D. Jim{\'{e}}nez Re and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Policy-Driven Routing Management Using {CIM}}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {259--271}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_20}, doi = {10.1007/11560326\_20}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/ClementeRPG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DaicosK05, author = {Constantine Daicos and Scott Knight}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {A Passive External Web Surveillance Technique for Private Networks}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {88--103}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_7}, doi = {10.1007/11560326\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DaicosK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DemerjianHBF05, author = {Jacques Demerjian and Ibrahim Hajjeh and Mohamad Badra and Salim Ferraz}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {A Secure Way to Combine IPsec, {NAT} {\&} {DHCP}}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {104--118}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_8}, doi = {10.1007/11560326\_8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DemerjianHBF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DulayLSSBH05, author = {Naranker Dulay and Emil C. Lupu and Morris Sloman and Joe Sventek and Nagwa L. Badr and Steven Heeps}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Self-managed Cells for Ubiquitous Systems}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {1--6}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_1}, doi = {10.1007/11560326\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DulayLSSBH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GalatenkoGKT05, author = {Alexei Galatenko and Alexander A. Grusho and Alexander Kniazev and Elena E. Timonina}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Statistical Covert Channels Through {PROXY} Server}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {424--429}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_34}, doi = {10.1007/11560326\_34}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GalatenkoGKT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GiacobazziM05, author = {Roberto Giacobazzi and Isabella Mastroeni}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {221--234}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_17}, doi = {10.1007/11560326\_17}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GiacobazziM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GorodetskyKSU05, author = {Vladimir Gorodetsky and Oleg Karsaev and Vladimir Samoilov and Alexander Ulanov}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {366--379}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_28}, doi = {10.1007/11560326\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GorodetskyKSU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GrushoKT05, author = {Alexander A. Grusho and Alexander Kniazev and Elena E. Timonina}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Detection of Illegal Information Flow}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {235--244}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_18}, doi = {10.1007/11560326\_18}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GrushoKT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GuFZZ05, author = {Yonggen Gu and Yuxi Fu and Farong Zhong and Han Zhu}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {A Generic Model for Analyzing Security Protocols}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {119--128}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_9}, doi = {10.1007/11560326\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GuFZZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Huang05, author = {Ming{-}Yuh Huang}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Critical Information Assurance Challenges for Modern Large-Scale Infrastructures}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {7--22}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_2}, doi = {10.1007/11560326\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Huang05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/JegesHK05, author = {Ern{\"{o}} Jeges and Zolt{\'{a}}n Horn{\'{a}}k and Csaba K{\"{o}}rm{\"{o}}czi}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Encoding Private Key in Fingerprint}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {430--435}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_35}, doi = {10.1007/11560326\_35}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/JegesHK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Johnson05, author = {Joseph E. Johnson}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Networks, Markov Lie Monoids, and Generalized Entropy}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {129--135}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_10}, doi = {10.1007/11560326\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Johnson05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KimYPK05, author = {Soon Seok Kim and Sang{-}Soo Yeo and Hong{-}Jin Park and Sung Kwon Kim}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {A New Scheme for the Location Information Protection in Mobile Communication Environments}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {436--441}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_36}, doi = {10.1007/11560326\_36}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KimYPK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KosiyatrakulOC05, author = {Thumrongsak Kosiyatrakul and Susan Older and Shiu{-}Kai Chin}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {A Modal Logic for Role-Based Access Control}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {179--193}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_14}, doi = {10.1007/11560326\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KosiyatrakulOC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KotenkoS05, author = {Igor V. Kotenko and Mikhail Stepashkin}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {311--324}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_24}, doi = {10.1007/11560326\_24}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KotenkoS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MoliszR05, author = {Wojciech Molisz and Jacek Rak}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Region Protection/Restoration Scheme in Survivable Networks}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {442--447}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_37}, doi = {10.1007/11560326\_37}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/MoliszR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/NicolL05, author = {David M. Nicol and Michael Liljenstam}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Models and Analysis of Active Worm Defense}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {38--53}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_4}, doi = {10.1007/11560326\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/NicolL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/PayerTKL05, author = {Udo Payer and Peter Teufl and Stefan Kraxberger and Mario Lamberger}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Massive Data Mining for Polymorphic Code Detection}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {448--453}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_38}, doi = {10.1007/11560326\_38}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/PayerTKL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/RekhisB05, author = {Slim Rekhis and Noureddine Boudriga}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {A Temporal Logic-Based Model for Forensic Investigation in Networked System Security}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {325--338}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_25}, doi = {10.1007/11560326\_25}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/RekhisB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SchafferS05, author = {Martin Schaffer and Peter Schartner}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Key Escrow with Tree-Based Access Structure}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {454--459}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_39}, doi = {10.1007/11560326\_39}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SchafferS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SchartnerS05, author = {Peter Schartner and Martin Schaffer}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Unique User-Generated Digital Pseudonyms}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {194--205}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_15}, doi = {10.1007/11560326\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SchartnerS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Serdiouk05, author = {Victor Serdiouk}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Behavior-Based Model of Detection and Prevention of Intrusions in Computer Networks}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {380--393}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_29}, doi = {10.1007/11560326\_29}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Serdiouk05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Smirnov05, author = {Mikhail I. Smirnov}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Trust by Workflow in Autonomic Communication}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {136--150}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_11}, doi = {10.1007/11560326\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Smirnov05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SummervilleSVM05, author = {Douglas H. Summerville and Victor A. Skormin and Alexander Volynkin and James Moronski}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {54--75}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_5}, doi = {10.1007/11560326\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SummervilleSVM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SwarupJP05, author = {Vipin Swarup and Sushil Jajodia and Joseph Pamula}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Rule-Based Topological Vulnerability Analysis}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {23--37}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_3}, doi = {10.1007/11560326\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SwarupJP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/TarakanovKS05, author = {Alexander O. Tarakanov and Sergei V. Kvachev and Alexander V. Sukhorukov}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {A Formal Immune Network and Its Implementation for On-line Intrusion Detection}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {394--405}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_30}, doi = {10.1007/11560326\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/TarakanovKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/TishkovKS05, author = {Artem Tishkov and Igor V. Kotenko and Ekaterina Sidelnikova}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Security Checker Architecture for Policy-Based Security Management}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {460--465}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_40}, doi = {10.1007/11560326\_40}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/TishkovKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/TsoumasDG05, author = {Bill Tsoumas and Stelios Dritsas and Dimitris Gritzalis}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {An Ontology-Based Approach to Information Systems Security Management}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {151--164}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_12}, doi = {10.1007/11560326\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/TsoumasDG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Yang05, author = {Soomi Yang}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {An Efficient Access Control Model Utilized the Attribute Certificate Structuring}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {466--471}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_41}, doi = {10.1007/11560326\_41}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Yang05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/YinWSG05, author = {Gang Yin and Huaimin Wang and Dian{-}xi Shi and Haiya Gu}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Towards More Controllable and Practical Delegation}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {245--258}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_19}, doi = {10.1007/11560326\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/YinWSG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/YoonRY05, author = {Eun{-}Jun Yoon and Eun{-}Kyung Ryu and Kee{-}Young Yoo}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Secure Protected Password Change Scheme}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {472--477}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_42}, doi = {10.1007/11560326\_42}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/YoonRY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZegzhdaV05, author = {Dmitry P. Zegzhda and Alex M. Vovk}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Secure Hybrid Operating System "Linux over Fenix"}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {272--285}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_21}, doi = {10.1007/11560326\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ZegzhdaV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZK05, author = {Peter D. Zegzhda and Dmitry P. Zegzhda and Maxim O. Kalinin}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Vulnerabilities Detection in the Configurations of {MS} Windows Operating System}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {339--351}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_26}, doi = {10.1007/11560326\_26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZhouLJSH05, author = {Zhouyi Zhou and Bin Liang and Li Jiang and Wenchang Shi and Yeping He}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {A Formal Description of {SECIMOS} Operating System}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {286--297}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_22}, doi = {10.1007/11560326\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ZhouLJSH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmmacns/2005, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326}, doi = {10.1007/11560326}, isbn = {3-540-29113-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Al-Ibrahim03, author = {Mohamed Al{-}Ibrahim}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {A Signcryption Scheme Based on Secret Sharing Technique}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {279--288}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_23}, doi = {10.1007/978-3-540-45215-7\_23}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Al-Ibrahim03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Al-IbrahimC03, author = {Mohamed Al{-}Ibrahim and Anton Cern{\'{y}}}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Authentication of Anycast Communication}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {419--423}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_36}, doi = {10.1007/978-3-540-45215-7\_36}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Al-IbrahimC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/AndoT03, author = {Ruo Ando and Yoshiyasu Takefuji}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with {SMTP} Proxy}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {424--427}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_37}, doi = {10.1007/978-3-540-45215-7\_37}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/AndoT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Barker03, author = {Steve Barker}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Distributed Access Control: {A} Logic-Based Approach}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {217--228}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_18}, doi = {10.1007/978-3-540-45215-7\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Barker03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/BenferhatAC03, author = {Salem Benferhat and Fabien Autrel and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Enhanced Correlation in an Intrusion Detection Process}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {157--170}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_13}, doi = {10.1007/978-3-540-45215-7\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/BenferhatAC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/BighamGL03, author = {John Bigham and David Gamez and Ning Lu}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Safeguarding {SCADA} Systems with Anomaly Detection}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {171--182}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_14}, doi = {10.1007/978-3-540-45215-7\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/BighamGL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/BistarelliCLM03, author = {Stefano Bistarelli and Iliano Cervesato and Gabriele Lenzini and Fabio Martinelli}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {86--99}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_7}, doi = {10.1007/978-3-540-45215-7\_7}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/BistarelliCLM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Caballero-GilH03, author = {Pino Caballero{-}Gil and Candelaria Hern{\'{a}}ndez{-}Goya}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {A Zero-Knowledge Identification Scheme}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {289--297}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_24}, doi = {10.1007/978-3-540-45215-7\_24}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Caballero-GilH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GootsIMM03, author = {Nick D. Goots and Boris V. Izotov and Alexander A. Moldovyan and Nick A. Moldovyan}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Fast Ciphers for Cheap Hardware: Differential Analysis of {SPECTR-H64}}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {449--452}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_43}, doi = {10.1007/978-3-540-45215-7\_43}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GootsIMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GorodetskyS03, author = {Vladimir Gorodetsky and Vladimir Samoilov}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {349--359}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_30}, doi = {10.1007/978-3-540-45215-7\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GorodetskyS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GrushoT03, author = {Alexander A. Grusho and Elena E. Timonina}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Construction of the Covert Channels}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {428--431}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_38}, doi = {10.1007/978-3-540-45215-7\_38}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GrushoT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GymnopoulosDGL03, author = {Lazaros Gymnopoulos and Stelios Dritsas and Stefanos Gritzalis and Costas Lambrinoudakis}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {{GRID} Security Review}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {100--111}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_8}, doi = {10.1007/978-3-540-45215-7\_8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/GymnopoulosDGL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KimH03, author = {Hyun{-}Sung Kim and Sung{-}Ho Hwang}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Multiplier for Public-Key Cryptosystem Based on Cellular Automata}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {436--439}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_40}, doi = {10.1007/978-3-540-45215-7\_40}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KimH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KoHHLL03, author = {Youngdai Ko and Deukjo Hong and Seokhie Hong and Sangjin Lee and Jongin Lim}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Linear Cryptanalysis of {SPECTR-H64} with Higher Order Differential Property}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {298--307}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_25}, doi = {10.1007/978-3-540-45215-7\_25}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KoHHLL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KokolakisLG03, author = {Spyros Kokolakis and Costas Lambrinoudakis and Dimitris Gritzalis}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {A Knowledge-Based Repository Model for Security Policies Management}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {112--121}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_9}, doi = {10.1007/978-3-540-45215-7\_9}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/KokolakisLG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KorzhikMMP03, author = {Valery I. Korzhik and Guillermo Morales{-}Luna and Irina Marakova and Carlos Pati{\~{n}}o{-}Ruvalcaba}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Digital Watermarking under a Filtering and Additive Noise Attack Condition}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {371--382}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_32}, doi = {10.1007/978-3-540-45215-7\_32}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KorzhikMMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KorzhikYS03, author = {Valery I. Korzhik and Viktor Yakovlev and Alexander Sinuk}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Achievability of the Key-Capacity in a Scenario of Key Sharing}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {308--315}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_26}, doi = {10.1007/978-3-540-45215-7\_26}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KorzhikYS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KosiyatrakulOHC03, author = {Thumrongsak Kosiyatrakul and Susan Older and Polar Humenn and Shiu{-}Kai Chin}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Implementing a Calculus for Distributed Access Control in Higher Order Logic and {HOL}}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {32--46}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_3}, doi = {10.1007/978-3-540-45215-7\_3}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KosiyatrakulOHC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KotenkoM03, author = {Igor V. Kotenko and Evgeny Man'kov}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Experiments with Simulation of Attacks against Computer Networks}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {183--194}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_15}, doi = {10.1007/978-3-540-45215-7\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KotenkoM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KumarM03, author = {Sri Kumar and Vladimir Marbukh}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {440--443}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_41}, doi = {10.1007/978-3-540-45215-7\_41}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KumarM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/LainB03, author = {Antonio Lain and Viacheslav Borisov}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Key History Tree: Efficient Group Key Management with Off-Line Members}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {241--254}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_20}, doi = {10.1007/978-3-540-45215-7\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/LainB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/LilianK03, author = {Lilian Mitrou and Konstantinos Moulinos}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Privacy and Data Protection in Electronic Communications}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {432--435}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_39}, doi = {10.1007/978-3-540-45215-7\_39}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/LilianK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MartinP03, author = {Francisco J. Mart{\'{\i}}n and Enric Plaza}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Alert Triage on the {ROC}}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {444--448}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_42}, doi = {10.1007/978-3-540-45215-7\_42}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MartinP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Martinelli03, author = {Fabio Martinelli}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Symbolic Partial Model Checking for Security Analysis}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {122--134}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_10}, doi = {10.1007/978-3-540-45215-7\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Martinelli03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MelnikovT03, author = {Yuri Melnikov and Alexander O. Tarakanov}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Immunocomputing Model of Intrusion Detection}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {453--456}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_44}, doi = {10.1007/978-3-540-45215-7\_44}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MelnikovT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Moldovyan03, author = {Nick A. Moldovyan}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {On Cipher Design Based on Switchable Controlled Operations}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {316--327}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_27}, doi = {10.1007/978-3-540-45215-7\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Moldovyan03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MunozFES03, author = {Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}} and Oscar Esparza and Miguel Soriano}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {A Certificate Status Checking Protocol for the Authenticated Dictionary}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {255--266}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_21}, doi = {10.1007/978-3-540-45215-7\_21}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/MunozFES03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/RostovtsevM03, author = {Alexander Rostovtsev and Elena Makhovenko}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Elliptic Curve Point Multiplication}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {328--336}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_28}, doi = {10.1007/978-3-540-45215-7\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/RostovtsevM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SandhuP03, author = {Ravi S. Sandhu and Jaehong Park}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Usage Control: {A} Vision for Next Generation Access Control}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {17--31}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_2}, doi = {10.1007/978-3-540-45215-7\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SandhuP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SantanaSC03, author = {Gustavo Santana and Leonid Sheremetov and Miguel Contreras}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Agent Platform Security Architecture}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {457--460}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_45}, doi = {10.1007/978-3-540-45215-7\_45}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SantanaSC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ShanmugasundaramMSB03, author = {Kulesh Shanmugasundaram and Nasir D. Memon and Anubhav Savant and Herv{\'{e}} Br{\"{o}}nnimann}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {ForNet: {A} Distributed Forensics Network}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {1--16}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_1}, doi = {10.1007/978-3-540-45215-7\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/ShanmugasundaramMSB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SklavosMK03, author = {Nicolas Sklavos and Alexander A. Moldovyan and Odysseas G. Koufopavlou}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {337--348}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_29}, doi = {10.1007/978-3-540-45215-7\_29}, timestamp = {Fri, 15 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/SklavosMK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SkorminSM03, author = {Victor A. Skormin and Douglas H. Summerville and James Moronski}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Detecting Malicious Codes by the Presence of Their "Gene of Self-replication"}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {195--205}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_16}, doi = {10.1007/978-3-540-45215-7\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SkorminSM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Slissenko03, author = {Anatol Slissenko}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Complexity Problems in the Analysis of Information Systems Security}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {47--56}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_4}, doi = {10.1007/978-3-540-45215-7\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Slissenko03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Smirnov03, author = {Michael Smirnov}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Rule-Based Systems Security Model}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {135--146}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_11}, doi = {10.1007/978-3-540-45215-7\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Smirnov03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SohnNM03, author = {Taeshik Shon and Taewoo Noh and Jongsub Moon}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Support Vector Machine Based {ICMP} Covert Channel Attack Detection}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {461--464}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_46}, doi = {10.1007/978-3-540-45215-7\_46}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SohnNM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SokolovaI03, author = {Svetlana P. Sokolova and Ruslan S. Ivlev}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Computer Immunology System with Variable Configuration}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {465--468}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_47}, doi = {10.1007/978-3-540-45215-7\_47}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SokolovaI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/StolfoHWNH03, author = {Salvatore J. Stolfo and Shlomo Hershkop and Ke Wang and Olivier Nimeskern and Chia{-}Wei Hu}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {A Behavior-Based Approach to Securing Email Systems}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {57--81}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_5}, doi = {10.1007/978-3-540-45215-7\_5}, timestamp = {Thu, 24 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/StolfoHWNH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Upadhyaya03, author = {Shambhu J. Upadhyaya}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Real-Time Intrusion Detection with Emphasis on Insider Attacks}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {82--85}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_6}, doi = {10.1007/978-3-540-45215-7\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Upadhyaya03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/WangZZ03, author = {Shuozhong Wang and Xinpeng Zhang and Kaiwen Zhang}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Data Hiding in Digital Audio by Frequency Domain Dithering}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {383--394}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_33}, doi = {10.1007/978-3-540-45215-7\_33}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/WangZZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/WeeM03, author = {Kyubum Wee and Byungeun Moon}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {206--216}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_17}, doi = {10.1007/978-3-540-45215-7\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/WeeM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/WolfS03, author = {Ruben Wolf and Markus Schneider}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Context-Dependent Access Control for Web-Based Collaboration Environments with Role-based Approach}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {267--278}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_22}, doi = {10.1007/978-3-540-45215-7\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/WolfS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/YumKL03, author = {Dae Hyun Yum and Jae Eun Kang and Pil Joong Lee}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Advanced Certificate Status Protocol}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {229--240}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_19}, doi = {10.1007/978-3-540-45215-7\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/YumKL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZK03, author = {Peter D. Zegzhda and Dmitry P. Zegzhda and Maxim O. Kalinin}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Logical Resolving for Security Evaluation}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {147--156}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_12}, doi = {10.1007/978-3-540-45215-7\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZhangWZ03, author = {Kaiwen Zhang and Shuozhong Wang and Xinpeng Zhang}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {360--370}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_31}, doi = {10.1007/978-3-540-45215-7\_31}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/ZhangWZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZhangWZ03a, author = {Xinpeng Zhang and Shuozhong Wang and Kaiwen Zhang}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Steganography with Least Histogram Abnormality}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {395--406}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_34}, doi = {10.1007/978-3-540-45215-7\_34}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/ZhangWZ03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZhangWZ03b, author = {Xinpeng Zhang and Shuozhong Wang and Kaiwen Zhang}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {407--418}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_35}, doi = {10.1007/978-3-540-45215-7\_35}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/ZhangWZ03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmmacns/2003, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b12005}, doi = {10.1007/B12005}, isbn = {3-540-40797-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Barker01, author = {Steve Barker}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {{TRBAC:} {A} Temporal Authorization Model}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {178--188}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_19}, doi = {10.1007/3-540-45116-1\_19}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Barker01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Cervesato01, author = {Iliano Cervesato}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Typed {MSR:} Syntax and Examples}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {159--177}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_18}, doi = {10.1007/3-540-45116-1\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Cervesato01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ChaddoudCS01, author = {Ghassan Chaddoud and Isabelle Chrisment and Andr{\'{e}} Schaff}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Dynamic Group Key Management Protocol}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {251--262}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_25}, doi = {10.1007/3-540-45116-1\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ChaddoudCS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DasguptaG01, author = {Dipankar Dasgupta and Fabio A. Gonz{\'{a}}lez}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {An Intelligent Decision Support System for Intrusion Detection and Response}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {1--14}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_1}, doi = {10.1007/3-540-45116-1\_1}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DasguptaG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DuranteFG01, author = {Antonio Durante and Riccardo Focardi and Roberto Gorrieri}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {{CVS} at Work: {A} Report on New Failures upon Some Cryptographic Protocols}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {287--299}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_28}, doi = {10.1007/3-540-45116-1\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DuranteFG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GootsMM01, author = {Nick D. Goots and Alexander A. Moldovyan and Nick A. Moldovyan}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Fast Encryption Algorithm Spectr-H64}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {275--286}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_27}, doi = {10.1007/3-540-45116-1\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GootsMM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GorodetskiKKKPS01, author = {Vladimir I. Gorodetski and Oleg Karsaev and Alexey Khabalov and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Agent-Based Model of Computer Network Security System: {A} Case Study}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {39--50}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_7}, doi = {10.1007/3-540-45116-1\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GorodetskiKKKPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GorodetskiPSS01, author = {Vladimir I. Gorodetski and Leonard J. Popyack and Vladimir Samoilov and Victor A. Skormin}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {SVD-Based Approach to Transparent Embedding Data into Digital Images}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {263--274}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_26}, doi = {10.1007/3-540-45116-1\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GorodetskiPSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GritzalisMK01, author = {Dimitris Gritzalis and Konstantinos Moulinos and Konstantinos Kostis}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {A Privacy-Enhancing e-Business Model Based on Infomediaries}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {72--83}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_10}, doi = {10.1007/3-540-45116-1\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GritzalisMK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Grusho01, author = {Alexander A. Grusho}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Mathematical Models of the Covert Channels}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {15--20}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_2}, doi = {10.1007/3-540-45116-1\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Grusho01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Heitmeyer01, author = {Constance L. Heitmeyer}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Applying Practical Formal Methods to the Specification and Analysis of Security Properties}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {84--89}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_11}, doi = {10.1007/3-540-45116-1\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Heitmeyer01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/IzotovMM01, author = {Boris V. Izotov and Alexander A. Moldovyan and Nick A. Moldovyan}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Controlled Operations as a Cryptographic Primitive}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {230--241}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_23}, doi = {10.1007/3-540-45116-1\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/IzotovMM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Jurjens01, author = {Jan J{\"{u}}rjens}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Composability of Secrecy}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {28--38}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_6}, doi = {10.1007/3-540-45116-1\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Jurjens01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KavutY01, author = {Sel{\c{c}}uk Kavut and Melek D. Y{\"{u}}cel}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {On Some Cryptographic Properties of Rijndael}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {300--312}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_29}, doi = {10.1007/3-540-45116-1\_29}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KavutY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KnorrW01, author = {Konstantin Knorr and Harald Weidner}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Analyzing Separation of Duties in Petri Net Workflows}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {102--114}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_13}, doi = {10.1007/3-540-45116-1\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KnorrW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KorjikM01, author = {Valeri Korjik and Kirill Morozov}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Generalized Oblivious Transfer Protocols Based on Noisy Channels}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {219--229}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_22}, doi = {10.1007/3-540-45116-1\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KorjikM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Kostogryzov01, author = {Andrey Kostogryzov}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality {(CEISOQ)}}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {90--101}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_12}, doi = {10.1007/3-540-45116-1\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Kostogryzov01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Meadows01, author = {Catherine Meadows}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Open Issues in Formal Methods for Cryptographic Protocol Analysis}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {21}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_3}, doi = {10.1007/3-540-45116-1\_3}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Meadows01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/RyutovN01, author = {Tatyana Ryutov and B. Clifford Neuman}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {The Set and Function Approach to Modeling Authorization in Distributed Systems}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {189--206}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_20}, doi = {10.1007/3-540-45116-1\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/RyutovN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Sandhu01, author = {Ravi S. Sandhu}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Future Directions in Role-Based Access Control Models}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {22--26}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_4}, doi = {10.1007/3-540-45116-1\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Sandhu01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SeleznyovMP01, author = {Alexandr Seleznyov and Oleksiy Mazhelis and Seppo Puuronen}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Learning Temporal Regularities of User Behavior for Anomaly Detection}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {143--152}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_16}, doi = {10.1007/3-540-45116-1\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SeleznyovMP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SinghFLD01, author = {Harjit Singh and Steven Furnell and Benn Lines and Paul Dowland}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {153--158}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_17}, doi = {10.1007/3-540-45116-1\_17}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SinghFLD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SkorminDMGPGT01, author = {Victor A. Skormin and Jos{\'{e}} G. Delgado{-}Frias and Dennis L. McGee and Joseph Giordano and Leonard J. Popyack and Vladimir I. Gorodetski and Alexander O. Tarakanov}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {{BASIS:} {A} Biological Approach to System Information Security}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {127--142}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_15}, doi = {10.1007/3-540-45116-1\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SkorminDMGPGT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Smirnov01, author = {Michael Smirnov}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Security Considerations and Models for Service Creation in Premium {IP} Networks}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {51--62}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_8}, doi = {10.1007/3-540-45116-1\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Smirnov01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Tarakanov01, author = {Alexander O. Tarakanov}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Information Security with Formal Immune Networks}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {115--126}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_14}, doi = {10.1007/3-540-45116-1\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Tarakanov01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Varadharajan01, author = {Vijay Varadharajan}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Secure Networked Computing}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {27}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_5}, doi = {10.1007/3-540-45116-1\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Varadharajan01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/YakovlevKS01, author = {Viktor Yakovlev and Valery Korjik and Alexander Sinuk}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {242--250}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_24}, doi = {10.1007/3-540-45116-1\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/YakovlevKS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZegzhdaSO01, author = {Dmitry P. Zegzhda and Pavel G. Stepanov and Alexey D. Otavin}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Fenix Secure Operating System: Principles, Models and Architecture}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {207--218}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_21}, doi = {10.1007/3-540-45116-1\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ZegzhdaSO01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZ01, author = {Peter D. Zegzhda and Dmitry P. Zegzhda}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Secure Systems Design Technology}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {63--71}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_9}, doi = {10.1007/3-540-45116-1\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmmacns/2001, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1}, doi = {10.1007/3-540-45116-1}, isbn = {3-540-42103-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.