Search dblp for Publications

export results for "stream:conf/mmmacns:"

 download as .bib file

@inproceedings{DBLP:conf/mmmacns/BraekenBTV17,
  author       = {An Braeken and
                  Sergey Bezzateev and
                  Abdellah Touhafi and
                  Natalia Voloshina},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {{HEPPA:} Highly Efficient Privacy Preserving Authentication for {ITS}},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {260--271},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_21},
  doi          = {10.1007/978-3-319-65127-9\_21},
  timestamp    = {Thu, 14 Oct 2021 10:27:55 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/BraekenBTV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/BranitskiyK17,
  author       = {Alexander Branitskiy and
                  Igor V. Kotenko},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Network Anomaly Detection Based on an Ensemble of Adaptive Binary
                  Classifiers},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {143--157},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_12},
  doi          = {10.1007/978-3-319-65127-9\_12},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/BranitskiyK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DavisKDS17,
  author       = {Matthew Davis and
                  Emrah Korkmaz and
                  Andrey M. Dolgikh and
                  Victor A. Skormin},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Resident Security System for Government/Industry Owned Computers},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {185--194},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_15},
  doi          = {10.1007/978-3-319-65127-9\_15},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DavisKDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DongY0L017,
  author       = {Qi Dong and
                  Zekun Yang and
                  Yu Chen and
                  Xiaohua Li and
                  Kai Zeng},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Anomaly Detection in Cognitive Radio Networks Exploiting Singular
                  Spectrum Analysis},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {247--259},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_20},
  doi          = {10.1007/978-3-319-65127-9\_20},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DongY0L017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DragerZ17,
  author       = {Steven Drager and
                  Janusz Zalewski},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {A Novel and Unifying View of Trustworthiness in Cyberphysical Systems},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {327--338},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_26},
  doi          = {10.1007/978-3-319-65127-9\_26},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DragerZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GkioulosW17,
  author       = {Vasileios Gkioulos and
                  Stephen D. Wolthusen},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Security Requirements for the Deployment of Services Across Tactical
                  {SOA}},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {115--127},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_10},
  doi          = {10.1007/978-3-319-65127-9\_10},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GkioulosW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GorskiL17,
  author       = {Janusz G{\'{o}}rski and
                  Katarzyna Lukasiewicz},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Meeting Requirements Imposed by Secure Software Development Standards
                  and Still Remaining Agile},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_1},
  doi          = {10.1007/978-3-319-65127-9\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GorskiL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Grusho17,
  author       = {Alexander A. Grusho},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Data Mining and Information Security},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {28--33},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_3},
  doi          = {10.1007/978-3-319-65127-9\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Grusho17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GrushoGZZT17,
  author       = {Alexander A. Grusho and
                  Nick A. Grusho and
                  Michael I. Zabezhailo and
                  Alexander Zatsarinny and
                  Elena E. Timonina},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Information Security of {SDN} on the Basis of Meta Data},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {339--347},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_27},
  doi          = {10.1007/978-3-319-65127-9\_27},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GrushoGZZT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Hutchison17,
  author       = {Andrew Hutchison},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Adapting Enterprise Security Approaches for Evolving Cloud Processing
                  and Networking Models},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {16--27},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_2},
  doi          = {10.1007/978-3-319-65127-9\_2},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Hutchison17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/IraqiB17,
  author       = {Omar Iraqi and
                  Hanan El Bakkali},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Toward Third-Party Immune Applications},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {348--359},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_28},
  doi          = {10.1007/978-3-319-65127-9\_28},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/IraqiB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KolomeecGDCKD17,
  author       = {Maxim Kolomeec and
                  Gustavo {Gonzalez Granadillo} and
                  Elena Doynikova and
                  Andrey Chechulin and
                  Igor V. Kotenko and
                  Herv{\'{e}} Debar},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Choosing Models for Security Metrics Visualization},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {75--87},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_7},
  doi          = {10.1007/978-3-319-65127-9\_7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KolomeecGDCKD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KonorskiR17,
  author       = {Jerzy Konorski and
                  Karol Rydzewski},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc
                  Networks with a Reputation System},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {131--142},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_11},
  doi          = {10.1007/978-3-319-65127-9\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KonorskiR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KopeikinTTS17,
  author       = {Anton Kopeikin and
                  Arnur G. Tokhtabayev and
                  Nurlan Tashatov and
                  Dina Satybaldina},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {tLab: {A} System Enabling Malware Clustering Based on Suspicious Activity
                  Trees},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {195--210},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_16},
  doi          = {10.1007/978-3-319-65127-9\_16},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KopeikinTTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KorkmazDDS17,
  author       = {Emrah Korkmaz and
                  Matthew Davis and
                  Andrey M. Dolgikh and
                  Victor A. Skormin},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Detection and Mitigation of Time Delay Injection Attacks on Industrial
                  Control Systems with PLCs},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {62--74},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_6},
  doi          = {10.1007/978-3-319-65127-9\_6},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KorkmazDDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KorzhikFGM17,
  author       = {Valery I. Korzhik and
                  Ivan Fedyanin and
                  Artur Godlewski and
                  Guillermo Morales{-}Luna},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Steganalysis Based on Statistical Properties of the Encrypted Messages},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {288--298},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_23},
  doi          = {10.1007/978-3-319-65127-9\_23},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KorzhikFGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/LemaireVDN17,
  author       = {Laurens Lemaire and
                  Jan Vossaert and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Extending {FAST-CPS} for the Analysis of Data Flows in Cyber-Physical
                  Systems},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {37--49},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_4},
  doi          = {10.1007/978-3-319-65127-9\_4},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/LemaireVDN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MavroeidisN17,
  author       = {Vasileios Mavroeidis and
                  Mathew Nicho},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Quick Response Code Secure: {A} Cryptographically Secure Anti-Phishing
                  Tool for {QR} Code Attacks},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {313--324},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_25},
  doi          = {10.1007/978-3-319-65127-9\_25},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MavroeidisN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MetereD17,
  author       = {Roberto Metere and
                  Changyu Dong},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Automated Cryptographic Analysis of the Pedersen Commitment Scheme},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {275--287},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_22},
  doi          = {10.1007/978-3-319-65127-9\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MetereD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MjolsnesO17,
  author       = {Stig Fr. Mj{\o}lsnes and
                  Ruxandra F. Olimid},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Easy 4G/LTE {IMSI} Catchers for Non-Programmers},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {235--246},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_19},
  doi          = {10.1007/978-3-319-65127-9\_19},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MjolsnesO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/NagothuD17,
  author       = {Deeraj Nagothu and
                  Andrey M. Dolgikh},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {iCrawl: {A} Visual High Interaction Web Crawler},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {91--103},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_8},
  doi          = {10.1007/978-3-319-65127-9\_8},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/NagothuD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/NiemiecF17,
  author       = {Marcin Niemiec and
                  Maciej Francikiewicz},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Security Assessment of Cryptographic Algorithms},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {299--312},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_24},
  doi          = {10.1007/978-3-319-65127-9\_24},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/NiemiecF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/NovikovaM17,
  author       = {Evgenia Novikova and
                  Ivan Murenin},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Visualization-Driven Approach to Anomaly Detection in the Movement
                  of Critical Infrastructure},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {50--61},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_5},
  doi          = {10.1007/978-3-319-65127-9\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/NovikovaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/OstapA17,
  author       = {Hubert Ostap and
                  Ryszard Antkiewicz},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {A Concept of Clustering-Based Method for Botnet Detection},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {223--234},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_18},
  doi          = {10.1007/978-3-319-65127-9\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/OstapA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/PopyackB17,
  author       = {Leonard J. Popyack and
                  Jay Biernat},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Race Condition Faults in Multi-core Systems},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {104--114},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_9},
  doi          = {10.1007/978-3-319-65127-9\_9},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/PopyackB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SitekK17,
  author       = {Albert Sitek and
                  Zbigniew Kotulski},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Cardholder's Reputation System for Contextual Risk Management in Payment
                  Transactions},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {158--170},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_13},
  doi          = {10.1007/978-3-319-65127-9\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SitekK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ThanigaivelanNV17,
  author       = {Nanda Kumar Thanigaivelan and
                  Ethiopia Nigussie and
                  Seppo Virtanen and
                  Jouni Isoaho},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Towards Self-aware Approach for Mobile Devices Security},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {171--182},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_14},
  doi          = {10.1007/978-3-319-65127-9\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ThanigaivelanNV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/TokhtabayevKTS17,
  author       = {Arnur G. Tokhtabayev and
                  Anton Kopeikin and
                  Nurlan Tashatov and
                  Dina Satybaldina},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Malware Analysis and Detection via Activity Trees in User-Dependent
                  Environment},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {211--222},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_17},
  doi          = {10.1007/978-3-319-65127-9\_17},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/TokhtabayevKTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2017,
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9},
  doi          = {10.1007/978-3-319-65127-9},
  isbn         = {978-3-319-65126-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/AvanesovCRT12,
  author       = {Tigran Avanesov and
                  Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Towards the Orchestration of Secured Services under Non-disclosure
                  Policies},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {130--145},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_12},
  doi          = {10.1007/978-3-642-33704-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/AvanesovCRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/CadenheadKKT12,
  author       = {Tyrone Cadenhead and
                  Murat Kantarcioglu and
                  Vaibhav Khadilkar and
                  Bhavani Thuraisingham},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Design and Implementation of a Cloud-Based Assured Information Sharing
                  System},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {36--50},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_4},
  doi          = {10.1007/978-3-642-33704-8\_4},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/CadenheadKKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ChechulinKD12,
  author       = {Andrey Chechulin and
                  Igor V. Kotenko and
                  Vasily Desnitsky},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {An Approach for Network Information Flow Analysis for Systems of Embedded
                  Components},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {146--155},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_13},
  doi          = {10.1007/978-3-642-33704-8\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ChechulinKD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DesharnaisKT12,
  author       = {Jos{\'{e}}e Desharnais and
                  Erwanne P. Kanyabwero and
                  Nadia Tawbi},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Enforcing Information Flow Policies by a Three-Valued Analysis},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {114--129},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_11},
  doi          = {10.1007/978-3-642-33704-8\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DesharnaisKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DesnitskyKC12,
  author       = {Vasily Desnitsky and
                  Igor V. Kotenko and
                  Andrey Chechulin},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Configuration-Based Approach to Embedded Device Security},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {270--285},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_23},
  doi          = {10.1007/978-3-642-33704-8\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DesnitskyKC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DiniMSS12,
  author       = {Gianluca Dini and
                  Fabio Martinelli and
                  Andrea Saracino and
                  Daniele Sgandurra},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {{MADAM:} {A} Multi-level Anomaly Detector for Android Malware},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {240--253},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_21},
  doi          = {10.1007/978-3-642-33704-8\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DiniMSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DolgikhNSB12,
  author       = {Andrey M. Dolgikh and
                  Tomas Nykodym and
                  Victor A. Skormin and
                  Zachary Birnbaum},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Using Behavioral Modeling and Customized Normalcy Profiles as Protection
                  against Targeted Cyber-Attacks},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {191--202},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_17},
  doi          = {10.1007/978-3-642-33704-8\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DolgikhNSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GranadilloDJGA12,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Herv{\'{e}} Debar and
                  Gr{\'{e}}goire Jacob and
                  Chrystel Gaber and
                  Mohammed Achemlal},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Individual Countermeasure Selection Based on the Return On Response
                  Investment Index},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_14},
  doi          = {10.1007/978-3-642-33704-8\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GranadilloDJGA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GrushoGT12,
  author       = {Alexander A. Grusho and
                  Nikolai A. Grusho and
                  Elena E. Timonina},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Alternative Mechanisms for Information Security},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {108--113},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_10},
  doi          = {10.1007/978-3-642-33704-8\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GrushoGT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/JinSK12,
  author       = {Xin Jin and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {{RABAC:} Role-Centric Attribute-Based Access Control},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {84--96},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_8},
  doi          = {10.1007/978-3-642-33704-8\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/JinSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KerriganC12,
  author       = {Brendan Kerrigan and
                  Yu Chen},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Study of Entropy Sources in Cloud Computers: Random Number Generation
                  on Cloud Hosts},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {286--298},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_24},
  doi          = {10.1007/978-3-642-33704-8\_24},
  timestamp    = {Thu, 10 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KerriganC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KomashinskiyK12,
  author       = {Dmitriy Komashinskiy and
                  Igor V. Kotenko},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Using Low-Level Dynamic Attributes for Malware Detection Based on
                  Data Mining Methods},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {254--269},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_22},
  doi          = {10.1007/978-3-642-33704-8\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KomashinskiyK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Livshits12,
  author       = {Benjamin Livshits},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Finding Malware on a Web Scale},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_1},
  doi          = {10.1007/978-3-642-33704-8\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Livshits12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MartinelliMM12,
  author       = {Fabio Martinelli and
                  Ilaria Matteucci and
                  Charles Morisset},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {From Qualitative to Quantitative Enforcement of Security Policy},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {22--35},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_3},
  doi          = {10.1007/978-3-642-33704-8\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MartinelliMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MoldovyanMN12,
  author       = {Alexander A. Moldovyan and
                  Nikolay A. Moldovyan and
                  Evgenia Novikova},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Blind 384-bit Digital Signature Scheme},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {77--83},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_7},
  doi          = {10.1007/978-3-642-33704-8\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MoldovyanMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MustaphaDJ12,
  author       = {Yosra Ben Mustapha and
                  Herv{\'{e}} Debar and
                  Gr{\'{e}}goire Jacob},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {203--217},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_18},
  doi          = {10.1007/978-3-642-33704-8\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MustaphaDJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Oleshchuk12,
  author       = {Vladimir A. Oleshchuk},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Trust-Aware {RBAC}},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {97--107},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_9},
  doi          = {10.1007/978-3-642-33704-8\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Oleshchuk12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/RiekeCHPG12,
  author       = {Roland Rieke and
                  Luigi Coppolino and
                  Andrew Hutchison and
                  Elsa Prieto and
                  Chrystel Gaber},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Security and Reliability Requirements for Advanced Security Event
                  Management},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {171--180},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_15},
  doi          = {10.1007/978-3-642-33704-8\_15},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/RiekeCHPG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SchutteRW12,
  author       = {Julian Sch{\"{u}}tte and
                  Roland Rieke and
                  Timo Winkelvos},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Model-Based Security Event Management},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {181--190},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_16},
  doi          = {10.1007/978-3-642-33704-8\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SchutteRW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/TsayM12,
  author       = {Joe{-}Kai Tsay and
                  Stig Fr. Mj{\o}lsnes},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Vulnerability in the {UMTS} and {LTE} Authentication and Key Agreement
                  Protocols},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {65--76},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_6},
  doi          = {10.1007/978-3-642-33704-8\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/TsayM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/WangJMS12,
  author       = {Zhaohui Wang and
                  Ryan Johnson and
                  Rahul Murmuria and
                  Angelos Stavrou},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Exposing Security Risks for Commercial Mobile Devices},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_2},
  doi          = {10.1007/978-3-642-33704-8\_2},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/WangJMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/YakovlevKBM12,
  author       = {Viktor Yakovlev and
                  Valery I. Korzhik and
                  Mihail Bakaev and
                  Guillermo Morales{-}Luna},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Optimization of Key Distribution Protocols Based on Extractors for
                  Noisy Channels within Active Adversaries},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {51--64},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_5},
  doi          = {10.1007/978-3-642-33704-8\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/YakovlevKBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/YavvariTRS12,
  author       = {Chaitanya Yavvari and
                  Arnur G. Tokhtabayev and
                  Huzefa Rangwala and
                  Angelos Stavrou},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Malware Characterization Using Behavioral Components},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {226--239},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_20},
  doi          = {10.1007/978-3-642-33704-8\_20},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/YavvariTRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZegzhdaS12,
  author       = {Dmitry P. Zegzhda and
                  Tatiana V. Stepanova},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Stochastic Model of Interaction between Botnets and Distributed Computer
                  Defense Systems},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {218--225},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_19},
  doi          = {10.1007/978-3-642-33704-8\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZegzhdaS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZKK12,
  author       = {Peter D. Zegzhda and
                  Dmitry P. Zegzhda and
                  Maxim O. Kalinin and
                  Artem S. Konoplev},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Security Modeling of Grid Systems Using Petri Nets},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {299--308},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_25},
  doi          = {10.1007/978-3-642-33704-8\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZN12,
  author       = {Peter D. Zegzhda and
                  Dmitry P. Zegzhda and
                  Alexey V. Nikolskiy},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Using Graph Theory for Cloud System Security Modeling},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {309--318},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_26},
  doi          = {10.1007/978-3-642-33704-8\_26},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2012,
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8},
  doi          = {10.1007/978-3-642-33704-8},
  isbn         = {978-3-642-33703-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/BensonCCJO10,
  author       = {Glenn S. Benson and
                  Shiu{-}Kai Chin and
                  Sean Croston and
                  Karthick Jayaraman and
                  Susan Older},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Credentials Management for High-Value Transactions},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {169--182},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_13},
  doi          = {10.1007/978-3-642-14706-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/BensonCCJO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ChinMOV10,
  author       = {Shiu{-}Kai Chin and
                  Sarah Muccio and
                  Susan Older and
                  Thomas N. J. Vestal},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Policy-Based Design and Verification for Mission Assurance},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {125--138},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_10},
  doi          = {10.1007/978-3-642-14706-7\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ChinMOV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DebarKCC10,
  author       = {Herv{\'{e}} Debar and
                  Nizar Kheir and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Service Dependencies in Information Systems Security},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_1},
  doi          = {10.1007/978-3-642-14706-7\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DebarKCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DesnitskyK10,
  author       = {Vasily Desnitsky and
                  Igor V. Kotenko},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Security and Scalability of Remote Entrusting Protection},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {298--306},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_23},
  doi          = {10.1007/978-3-642-14706-7\_23},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DesnitskyK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DomnitserAP10,
  author       = {Leonid Domnitser and
                  Nael B. Abu{-}Ghazaleh and
                  Dmitry Ponomarev},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Predictive Model for Cache-Based Side Channels in Multicore and
                  Multithreaded Microprocessors},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {70--85},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_6},
  doi          = {10.1007/978-3-642-14706-7\_6},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DomnitserAP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Gollmann10,
  author       = {Dieter Gollmann},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Secure Applications without Secure Infrastructures},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {21--31},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_2},
  doi          = {10.1007/978-3-642-14706-7\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Gollmann10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GrushoGT10,
  author       = {Alexander A. Grusho and
                  Nikolai A. Grusho and
                  Elena E. Timonina},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Problems of Modeling in the Analysis of Covert Channels},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {118--124},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_9},
  doi          = {10.1007/978-3-642-14706-7\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GrushoGT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KhouryT10,
  author       = {Rapha{\"{e}}l Khoury and
                  Nadia Tawbi},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Using Equivalence Relations for Corrective Enforcement of Security
                  Policies},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {139--154},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_11},
  doi          = {10.1007/978-3-642-14706-7\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KhouryT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KraxbergerDH10,
  author       = {Stefan Kraxberger and
                  Peter Danner and
                  Daniel M. Hein},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Secure Multi-Agent System for Multi-Hop Environments},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {270--283},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_21},
  doi          = {10.1007/978-3-642-14706-7\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KraxbergerDH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MarkovK10,
  author       = {Yaroslav A. Markov and
                  Maxim O. Kalinin},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Intellectual Intrusion Detection with Sequences Alignment Methods},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {217--228},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_17},
  doi          = {10.1007/978-3-642-14706-7\_17},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MarkovK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MoldovyanM10,
  author       = {Dmitriy N. Moldovyan and
                  Nikolay A. Moldovyan},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A New Hard Problem over Non-commutative Finite Groups for Cryptographic
                  Protocols},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {183--194},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_14},
  doi          = {10.1007/978-3-642-14706-7\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MoldovyanM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MoliszR10,
  author       = {Wojciech Molisz and
                  Jacek Rak},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Novel Genetic Approach to Provide Differentiated Levels of Service
                  Resilience in {IP-MPLS/WDM} Networks},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {307--320},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_24},
  doi          = {10.1007/978-3-642-14706-7\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MoliszR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MoralesKXS10,
  author       = {Jose Andre Morales and
                  Erhan J. Kartaltepe and
                  Shouhuai Xu and
                  Ravi S. Sandhu},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Symptoms-Based Detection of Bot Processes},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {229--241},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_18},
  doi          = {10.1007/978-3-642-14706-7\_18},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MoralesKXS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Morrisett10,
  author       = {Greg Morrisett},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Integrating Types and Specifications for Secure Software Development},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {32--35},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_3},
  doi          = {10.1007/978-3-642-14706-7\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Morrisett10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MunozMA10,
  author       = {Antonio Mu{\~{n}}oz and
                  Antonio Ma{\~{n}}a and
                  Pablo Ant{\'{o}}n},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {In the Track of the Agent Protection: {A} Solution Based on Cryptographic
                  Hardware},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {284--297},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_22},
  doi          = {10.1007/978-3-642-14706-7\_22},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MunozMA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/NguyenPF10,
  author       = {Hai Thanh Nguyen and
                  Slobodan Petrovic and
                  Katrin Franke},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Comparison of Feature-Selection Methods for Intrusion Detection},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {242--255},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_19},
  doi          = {10.1007/978-3-642-14706-7\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/NguyenPF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Pietre-CambacedesB10,
  author       = {Ludovic Pi{\`{e}}tre{-}Cambac{\'{e}}d{\`{e}}s and
                  Marc Bouissou},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Attack and Defense Modeling with {BDMP}},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {86--101},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_7},
  doi          = {10.1007/978-3-642-14706-7\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Pietre-CambacedesB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Preneel10,
  author       = {Bart Preneel},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Cryptography for Network Security: Failures, Successes and Challenges},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {36--54},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_4},
  doi          = {10.1007/978-3-642-14706-7\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Preneel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/RiekeS10,
  author       = {Roland Rieke and
                  Zaharina Stoynova},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Predictive Security Analysis for Event-Driven Processes},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {321--328},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_25},
  doi          = {10.1007/978-3-642-14706-7\_25},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/RiekeS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Sacha10,
  author       = {Krzysztof Sacha},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Credential Chain Discovery in RT\({}^{\mbox{T}}\) Trust Management
                  Language},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {195--208},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_15},
  doi          = {10.1007/978-3-642-14706-7\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Sacha10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SaenkoK10,
  author       = {Igor Saenko and
                  Igor V. Kotenko},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Genetic Optimization of Access Control Schemes in Virtual Local Area
                  Networks},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {209--216},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_16},
  doi          = {10.1007/978-3-642-14706-7\_16},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SaenkoK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SandhuKNW10,
  author       = {Ravi S. Sandhu and
                  Ram Krishnan and
                  Jianwei Niu and
                  William H. Winsborough},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Group-Centric Models for Secure and Agile Information Sharing},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {55--69},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_5},
  doi          = {10.1007/978-3-642-14706-7\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SandhuKNW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SankaranarayananUK10,
  author       = {Vidyaraman Sankaranarayanan and
                  Shambhu J. Upadhyaya and
                  Kevin A. Kwiat},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {102--117},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_8},
  doi          = {10.1007/978-3-642-14706-7\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SankaranarayananUK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/TeuflPL10,
  author       = {Peter Teufl and
                  Udo Payer and
                  Guenther Lackner},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {From {NLP} (Natural Language Processing) to {MLP} (Machine Language
                  Processing)},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {256--269},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_20},
  doi          = {10.1007/978-3-642-14706-7\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/TeuflPL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/UnalAC10,
  author       = {Devrim Unal and
                  Ozan Akar and
                  M. Ufuk {\c{C}}aglayan},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Model Checking of Location and Mobility Related Security Policy Specifications
                  in Ambient Calculus},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {155--168},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_12},
  doi          = {10.1007/978-3-642-14706-7\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/UnalAC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZegzhdaR10,
  author       = {Dmitry P. Zegzhda and
                  Ekaterina Rudina},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Virtual Environment Security Modeling},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {329--336},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_26},
  doi          = {10.1007/978-3-642-14706-7\_26},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZegzhdaR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZK10,
  author       = {Dmitry P. Zegzhda and
                  Peter D. Zegzhda and
                  Maxim O. Kalinin},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Clarifying Integrity Control at the Trusted Information Environment},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {337--344},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_27},
  doi          = {10.1007/978-3-642-14706-7\_27},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2010,
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7},
  doi          = {10.1007/978-3-642-14706-7},
  isbn         = {978-3-642-14705-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/AfinidadLIN05,
  author       = {Francis B. Afinidad and
                  Timothy E. Levin and
                  Cynthia E. Irvine and
                  Thuy D. Nguyen},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Foundation for a Time Interval Access Control Model},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {406--411},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_31},
  doi          = {10.1007/11560326\_31},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/AfinidadLIN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/AlharbyI05,
  author       = {Abdulrahman Alharby and
                  Hideki Imai},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Hybrid Intrusion Detection Model Based on Ordered Sequences},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {352--365},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_27},
  doi          = {10.1007/11560326\_27},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/AlharbyI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/BaiardiT05,
  author       = {Fabrizio Baiardi and
                  Claudio Telmon},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {298--310},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_23},
  doi          = {10.1007/11560326\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/BaiardiT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/BalbianiC05,
  author       = {Philippe Balbiani and
                  Fahima Cheikh},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Safety Problems in Access Control with Temporal Constraints},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {165--178},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_13},
  doi          = {10.1007/11560326\_13},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/BalbianiC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/BeauquierDM05,
  author       = {Dani{\`{e}}le Beauquier and
                  Marie Duflot and
                  Marius Minea},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Probabilistic Property-Specific Approach to Information Flow},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {206--220},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_16},
  doi          = {10.1007/11560326\_16},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/BeauquierDM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Buell05,
  author       = {Duncan A. Buell},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Calibrating Entropy Functions Applied to Computer Networks},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {76--87},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_6},
  doi          = {10.1007/11560326\_6},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Buell05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ButtsMB05,
  author       = {Jonathan W. Butts and
                  Robert F. Mills and
                  Rusty O. Baldwin},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Developing an Insider Threat Model Using Functional Decomposition},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {412--417},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_32},
  doi          = {10.1007/11560326\_32},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ButtsMB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ClementePG05,
  author       = {F{\'{e}}lix J. Garc{\'{\i}}a Clemente and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {An XML-Seamless Policy Based Management Framework},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {418--423},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_33},
  doi          = {10.1007/11560326\_33},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ClementePG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ClementeRPG05,
  author       = {F{\'{e}}lix J. Garc{\'{\i}}a Clemente and
                  Jes{\'{u}}s D. Jim{\'{e}}nez Re and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Policy-Driven Routing Management Using {CIM}},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {259--271},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_20},
  doi          = {10.1007/11560326\_20},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ClementeRPG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DaicosK05,
  author       = {Constantine Daicos and
                  Scott Knight},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Passive External Web Surveillance Technique for Private Networks},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_7},
  doi          = {10.1007/11560326\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DaicosK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DemerjianHBF05,
  author       = {Jacques Demerjian and
                  Ibrahim Hajjeh and
                  Mohamad Badra and
                  Salim Ferraz},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Secure Way to Combine IPsec, {NAT} {\&} {DHCP}},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {104--118},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_8},
  doi          = {10.1007/11560326\_8},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DemerjianHBF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DulayLSSBH05,
  author       = {Naranker Dulay and
                  Emil C. Lupu and
                  Morris Sloman and
                  Joe Sventek and
                  Nagwa L. Badr and
                  Steven Heeps},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Self-managed Cells for Ubiquitous Systems},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {1--6},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_1},
  doi          = {10.1007/11560326\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DulayLSSBH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GalatenkoGKT05,
  author       = {Alexei Galatenko and
                  Alexander A. Grusho and
                  Alexander Kniazev and
                  Elena E. Timonina},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Statistical Covert Channels Through {PROXY} Server},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {424--429},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_34},
  doi          = {10.1007/11560326\_34},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GalatenkoGKT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GiacobazziM05,
  author       = {Roberto Giacobazzi and
                  Isabella Mastroeni},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Generalized Abstract Non-interference: Abstract Secure Information-Flow
                  Analysis for Automata},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {221--234},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_17},
  doi          = {10.1007/11560326\_17},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GiacobazziM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GorodetskyKSU05,
  author       = {Vladimir Gorodetsky and
                  Oleg Karsaev and
                  Vladimir Samoilov and
                  Alexander Ulanov},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Asynchronous Alert Correlation in Multi-agent Intrusion Detection
                  Systems},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {366--379},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_28},
  doi          = {10.1007/11560326\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GorodetskyKSU05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GrushoKT05,
  author       = {Alexander A. Grusho and
                  Alexander Kniazev and
                  Elena E. Timonina},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Detection of Illegal Information Flow},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {235--244},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_18},
  doi          = {10.1007/11560326\_18},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GrushoKT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GuFZZ05,
  author       = {Yonggen Gu and
                  Yuxi Fu and
                  Farong Zhong and
                  Han Zhu},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Generic Model for Analyzing Security Protocols},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {119--128},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_9},
  doi          = {10.1007/11560326\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GuFZZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Huang05,
  author       = {Ming{-}Yuh Huang},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Critical Information Assurance Challenges for Modern Large-Scale Infrastructures},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {7--22},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_2},
  doi          = {10.1007/11560326\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Huang05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/JegesHK05,
  author       = {Ern{\"{o}} Jeges and
                  Zolt{\'{a}}n Horn{\'{a}}k and
                  Csaba K{\"{o}}rm{\"{o}}czi},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Encoding Private Key in Fingerprint},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {430--435},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_35},
  doi          = {10.1007/11560326\_35},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/JegesHK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Johnson05,
  author       = {Joseph E. Johnson},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Networks, Markov Lie Monoids, and Generalized Entropy},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {129--135},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_10},
  doi          = {10.1007/11560326\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Johnson05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KimYPK05,
  author       = {Soon Seok Kim and
                  Sang{-}Soo Yeo and
                  Hong{-}Jin Park and
                  Sung Kwon Kim},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A New Scheme for the Location Information Protection in Mobile Communication
                  Environments},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {436--441},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_36},
  doi          = {10.1007/11560326\_36},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KimYPK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KosiyatrakulOC05,
  author       = {Thumrongsak Kosiyatrakul and
                  Susan Older and
                  Shiu{-}Kai Chin},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Modal Logic for Role-Based Access Control},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {179--193},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_14},
  doi          = {10.1007/11560326\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KosiyatrakulOC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KotenkoS05,
  author       = {Igor V. Kotenko and
                  Mikhail Stepashkin},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Analyzing Vulnerabilities and Measuring Security Level at Design and
                  Exploitation Stages of Computer Network Life Cycle},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {311--324},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_24},
  doi          = {10.1007/11560326\_24},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KotenkoS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MoliszR05,
  author       = {Wojciech Molisz and
                  Jacek Rak},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Region Protection/Restoration Scheme in Survivable Networks},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {442--447},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_37},
  doi          = {10.1007/11560326\_37},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MoliszR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/NicolL05,
  author       = {David M. Nicol and
                  Michael Liljenstam},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Models and Analysis of Active Worm Defense},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {38--53},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_4},
  doi          = {10.1007/11560326\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/NicolL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/PayerTKL05,
  author       = {Udo Payer and
                  Peter Teufl and
                  Stefan Kraxberger and
                  Mario Lamberger},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Massive Data Mining for Polymorphic Code Detection},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {448--453},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_38},
  doi          = {10.1007/11560326\_38},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/PayerTKL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/RekhisB05,
  author       = {Slim Rekhis and
                  Noureddine Boudriga},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Temporal Logic-Based Model for Forensic Investigation in Networked
                  System Security},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {325--338},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_25},
  doi          = {10.1007/11560326\_25},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/RekhisB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SchafferS05,
  author       = {Martin Schaffer and
                  Peter Schartner},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Key Escrow with Tree-Based Access Structure},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {454--459},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_39},
  doi          = {10.1007/11560326\_39},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SchafferS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SchartnerS05,
  author       = {Peter Schartner and
                  Martin Schaffer},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Unique User-Generated Digital Pseudonyms},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {194--205},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_15},
  doi          = {10.1007/11560326\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SchartnerS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Serdiouk05,
  author       = {Victor Serdiouk},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Behavior-Based Model of Detection and Prevention of Intrusions in
                  Computer Networks},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {380--393},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_29},
  doi          = {10.1007/11560326\_29},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Serdiouk05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Smirnov05,
  author       = {Mikhail I. Smirnov},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Trust by Workflow in Autonomic Communication},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {136--150},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_11},
  doi          = {10.1007/11560326\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Smirnov05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SummervilleSVM05,
  author       = {Douglas H. Summerville and
                  Victor A. Skormin and
                  Alexander Volynkin and
                  James Moronski},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Prevention of Information Attacks by Run-Time Detection of Self-replication
                  in Computer Codes},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {54--75},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_5},
  doi          = {10.1007/11560326\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SummervilleSVM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SwarupJP05,
  author       = {Vipin Swarup and
                  Sushil Jajodia and
                  Joseph Pamula},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Rule-Based Topological Vulnerability Analysis},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {23--37},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_3},
  doi          = {10.1007/11560326\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SwarupJP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/TarakanovKS05,
  author       = {Alexander O. Tarakanov and
                  Sergei V. Kvachev and
                  Alexander V. Sukhorukov},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Formal Immune Network and Its Implementation for On-line Intrusion
                  Detection},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {394--405},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_30},
  doi          = {10.1007/11560326\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/TarakanovKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/TishkovKS05,
  author       = {Artem Tishkov and
                  Igor V. Kotenko and
                  Ekaterina Sidelnikova},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Security Checker Architecture for Policy-Based Security Management},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {460--465},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_40},
  doi          = {10.1007/11560326\_40},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/TishkovKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/TsoumasDG05,
  author       = {Bill Tsoumas and
                  Stelios Dritsas and
                  Dimitris Gritzalis},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {An Ontology-Based Approach to Information Systems Security Management},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {151--164},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_12},
  doi          = {10.1007/11560326\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/TsoumasDG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Yang05,
  author       = {Soomi Yang},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {An Efficient Access Control Model Utilized the Attribute Certificate
                  Structuring},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {466--471},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_41},
  doi          = {10.1007/11560326\_41},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Yang05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/YinWSG05,
  author       = {Gang Yin and
                  Huaimin Wang and
                  Dian{-}xi Shi and
                  Haiya Gu},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Towards More Controllable and Practical Delegation},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {245--258},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_19},
  doi          = {10.1007/11560326\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/YinWSG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/YoonRY05,
  author       = {Eun{-}Jun Yoon and
                  Eun{-}Kyung Ryu and
                  Kee{-}Young Yoo},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Secure Protected Password Change Scheme},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {472--477},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_42},
  doi          = {10.1007/11560326\_42},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/YoonRY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZegzhdaV05,
  author       = {Dmitry P. Zegzhda and
                  Alex M. Vovk},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Secure Hybrid Operating System "Linux over Fenix"},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {272--285},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_21},
  doi          = {10.1007/11560326\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZegzhdaV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZK05,
  author       = {Peter D. Zegzhda and
                  Dmitry P. Zegzhda and
                  Maxim O. Kalinin},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Vulnerabilities Detection in the Configurations of {MS} Windows Operating
                  System},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {339--351},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_26},
  doi          = {10.1007/11560326\_26},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZhouLJSH05,
  author       = {Zhouyi Zhou and
                  Bin Liang and
                  Li Jiang and
                  Wenchang Shi and
                  Yeping He},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {A Formal Description of {SECIMOS} Operating System},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {286--297},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_22},
  doi          = {10.1007/11560326\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZhouLJSH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2005,
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326},
  doi          = {10.1007/11560326},
  isbn         = {3-540-29113-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Al-Ibrahim03,
  author       = {Mohamed Al{-}Ibrahim},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {A Signcryption Scheme Based on Secret Sharing Technique},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {279--288},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_23},
  doi          = {10.1007/978-3-540-45215-7\_23},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Al-Ibrahim03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Al-IbrahimC03,
  author       = {Mohamed Al{-}Ibrahim and
                  Anton Cern{\'{y}}},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Authentication of Anycast Communication},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {419--423},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_36},
  doi          = {10.1007/978-3-540-45215-7\_36},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Al-IbrahimC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/AndoT03,
  author       = {Ruo Ando and
                  Yoshiyasu Takefuji},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination
                  with {SMTP} Proxy},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {424--427},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_37},
  doi          = {10.1007/978-3-540-45215-7\_37},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/AndoT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Barker03,
  author       = {Steve Barker},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Distributed Access Control: {A} Logic-Based Approach},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {217--228},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_18},
  doi          = {10.1007/978-3-540-45215-7\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Barker03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/BenferhatAC03,
  author       = {Salem Benferhat and
                  Fabien Autrel and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Enhanced Correlation in an Intrusion Detection Process},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {157--170},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_13},
  doi          = {10.1007/978-3-540-45215-7\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/BenferhatAC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/BighamGL03,
  author       = {John Bigham and
                  David Gamez and
                  Ning Lu},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Safeguarding {SCADA} Systems with Anomaly Detection},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {171--182},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_14},
  doi          = {10.1007/978-3-540-45215-7\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/BighamGL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/BistarelliCLM03,
  author       = {Stefano Bistarelli and
                  Iliano Cervesato and
                  Gabriele Lenzini and
                  Fabio Martinelli},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Relating Process Algebras and Multiset Rewriting for Immediate Decryption
                  Protocols},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {86--99},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_7},
  doi          = {10.1007/978-3-540-45215-7\_7},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/BistarelliCLM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Caballero-GilH03,
  author       = {Pino Caballero{-}Gil and
                  Candelaria Hern{\'{a}}ndez{-}Goya},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {A Zero-Knowledge Identification Scheme},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {289--297},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_24},
  doi          = {10.1007/978-3-540-45215-7\_24},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Caballero-GilH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GootsIMM03,
  author       = {Nick D. Goots and
                  Boris V. Izotov and
                  Alexander A. Moldovyan and
                  Nick A. Moldovyan},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Fast Ciphers for Cheap Hardware: Differential Analysis of {SPECTR-H64}},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {449--452},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_43},
  doi          = {10.1007/978-3-540-45215-7\_43},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GootsIMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GorodetskyS03,
  author       = {Vladimir Gorodetsky and
                  Vladimir Samoilov},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Simulation-Based Exploration of SVD-Based Technique for Hidden Communication
                  by Image Steganography Channel},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {349--359},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_30},
  doi          = {10.1007/978-3-540-45215-7\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GorodetskyS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GrushoT03,
  author       = {Alexander A. Grusho and
                  Elena E. Timonina},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Construction of the Covert Channels},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {428--431},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_38},
  doi          = {10.1007/978-3-540-45215-7\_38},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GrushoT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GymnopoulosDGL03,
  author       = {Lazaros Gymnopoulos and
                  Stelios Dritsas and
                  Stefanos Gritzalis and
                  Costas Lambrinoudakis},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {{GRID} Security Review},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {100--111},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_8},
  doi          = {10.1007/978-3-540-45215-7\_8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GymnopoulosDGL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KimH03,
  author       = {Hyun{-}Sung Kim and
                  Sung{-}Ho Hwang},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Multiplier for Public-Key Cryptosystem Based on Cellular Automata},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {436--439},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_40},
  doi          = {10.1007/978-3-540-45215-7\_40},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KimH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KoHHLL03,
  author       = {Youngdai Ko and
                  Deukjo Hong and
                  Seokhie Hong and
                  Sangjin Lee and
                  Jongin Lim},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Linear Cryptanalysis of {SPECTR-H64} with Higher Order Differential
                  Property},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {298--307},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_25},
  doi          = {10.1007/978-3-540-45215-7\_25},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KoHHLL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KokolakisLG03,
  author       = {Spyros Kokolakis and
                  Costas Lambrinoudakis and
                  Dimitris Gritzalis},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {A Knowledge-Based Repository Model for Security Policies Management},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {112--121},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_9},
  doi          = {10.1007/978-3-540-45215-7\_9},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KokolakisLG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KorzhikMMP03,
  author       = {Valery I. Korzhik and
                  Guillermo Morales{-}Luna and
                  Irina Marakova and
                  Carlos Pati{\~{n}}o{-}Ruvalcaba},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Digital Watermarking under a Filtering and Additive Noise Attack Condition},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {371--382},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_32},
  doi          = {10.1007/978-3-540-45215-7\_32},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KorzhikMMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KorzhikYS03,
  author       = {Valery I. Korzhik and
                  Viktor Yakovlev and
                  Alexander Sinuk},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Achievability of the Key-Capacity in a Scenario of Key Sharing},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {308--315},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_26},
  doi          = {10.1007/978-3-540-45215-7\_26},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KorzhikYS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KosiyatrakulOHC03,
  author       = {Thumrongsak Kosiyatrakul and
                  Susan Older and
                  Polar Humenn and
                  Shiu{-}Kai Chin},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Implementing a Calculus for Distributed Access Control in Higher Order
                  Logic and {HOL}},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {32--46},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_3},
  doi          = {10.1007/978-3-540-45215-7\_3},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KosiyatrakulOHC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KotenkoM03,
  author       = {Igor V. Kotenko and
                  Evgeny Man'kov},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Experiments with Simulation of Attacks against Computer Networks},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {183--194},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_15},
  doi          = {10.1007/978-3-540-45215-7\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KotenkoM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KumarM03,
  author       = {Sri Kumar and
                  Vladimir Marbukh},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {A Game Theoretic Approach to Analysis and Design of Survivable and
                  Secure Systems and Protocols},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {440--443},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_41},
  doi          = {10.1007/978-3-540-45215-7\_41},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KumarM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/LainB03,
  author       = {Antonio Lain and
                  Viacheslav Borisov},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Key History Tree: Efficient Group Key Management with Off-Line Members},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {241--254},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_20},
  doi          = {10.1007/978-3-540-45215-7\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/LainB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/LilianK03,
  author       = {Lilian Mitrou and
                  Konstantinos Moulinos},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Privacy and Data Protection in Electronic Communications},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {432--435},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_39},
  doi          = {10.1007/978-3-540-45215-7\_39},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/LilianK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MartinP03,
  author       = {Francisco J. Mart{\'{\i}}n and
                  Enric Plaza},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Alert Triage on the {ROC}},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {444--448},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_42},
  doi          = {10.1007/978-3-540-45215-7\_42},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MartinP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Martinelli03,
  author       = {Fabio Martinelli},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Symbolic Partial Model Checking for Security Analysis},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {122--134},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_10},
  doi          = {10.1007/978-3-540-45215-7\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Martinelli03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MelnikovT03,
  author       = {Yuri Melnikov and
                  Alexander O. Tarakanov},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Immunocomputing Model of Intrusion Detection},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {453--456},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_44},
  doi          = {10.1007/978-3-540-45215-7\_44},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MelnikovT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Moldovyan03,
  author       = {Nick A. Moldovyan},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {On Cipher Design Based on Switchable Controlled Operations},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {316--327},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_27},
  doi          = {10.1007/978-3-540-45215-7\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Moldovyan03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MunozFES03,
  author       = {Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}} and
                  Oscar Esparza and
                  Miguel Soriano},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {A Certificate Status Checking Protocol for the Authenticated Dictionary},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {255--266},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_21},
  doi          = {10.1007/978-3-540-45215-7\_21},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MunozFES03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/RostovtsevM03,
  author       = {Alexander Rostovtsev and
                  Elena Makhovenko},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Elliptic Curve Point Multiplication},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {328--336},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_28},
  doi          = {10.1007/978-3-540-45215-7\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/RostovtsevM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SandhuP03,
  author       = {Ravi S. Sandhu and
                  Jaehong Park},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Usage Control: {A} Vision for Next Generation Access Control},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_2},
  doi          = {10.1007/978-3-540-45215-7\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SandhuP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SantanaSC03,
  author       = {Gustavo Santana and
                  Leonid Sheremetov and
                  Miguel Contreras},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Agent Platform Security Architecture},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {457--460},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_45},
  doi          = {10.1007/978-3-540-45215-7\_45},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SantanaSC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ShanmugasundaramMSB03,
  author       = {Kulesh Shanmugasundaram and
                  Nasir D. Memon and
                  Anubhav Savant and
                  Herv{\'{e}} Br{\"{o}}nnimann},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {ForNet: {A} Distributed Forensics Network},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_1},
  doi          = {10.1007/978-3-540-45215-7\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ShanmugasundaramMSB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SklavosMK03,
  author       = {Nicolas Sklavos and
                  Alexander A. Moldovyan and
                  Odysseas G. Koufopavlou},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Encryption and Data Dependent Permutations: Implementation Cost and
                  Performance Evaluation},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {337--348},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_29},
  doi          = {10.1007/978-3-540-45215-7\_29},
  timestamp    = {Fri, 15 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SklavosMK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SkorminSM03,
  author       = {Victor A. Skormin and
                  Douglas H. Summerville and
                  James Moronski},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Detecting Malicious Codes by the Presence of Their "Gene of Self-replication"},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {195--205},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_16},
  doi          = {10.1007/978-3-540-45215-7\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SkorminSM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Slissenko03,
  author       = {Anatol Slissenko},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Complexity Problems in the Analysis of Information Systems Security},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {47--56},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_4},
  doi          = {10.1007/978-3-540-45215-7\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Slissenko03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Smirnov03,
  author       = {Michael Smirnov},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Rule-Based Systems Security Model},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {135--146},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_11},
  doi          = {10.1007/978-3-540-45215-7\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Smirnov03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SohnNM03,
  author       = {Taeshik Shon and
                  Taewoo Noh and
                  Jongsub Moon},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Support Vector Machine Based {ICMP} Covert Channel Attack Detection},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {461--464},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_46},
  doi          = {10.1007/978-3-540-45215-7\_46},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SohnNM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SokolovaI03,
  author       = {Svetlana P. Sokolova and
                  Ruslan S. Ivlev},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Computer Immunology System with Variable Configuration},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {465--468},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_47},
  doi          = {10.1007/978-3-540-45215-7\_47},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SokolovaI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/StolfoHWNH03,
  author       = {Salvatore J. Stolfo and
                  Shlomo Hershkop and
                  Ke Wang and
                  Olivier Nimeskern and
                  Chia{-}Wei Hu},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {A Behavior-Based Approach to Securing Email Systems},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {57--81},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_5},
  doi          = {10.1007/978-3-540-45215-7\_5},
  timestamp    = {Thu, 24 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/StolfoHWNH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Upadhyaya03,
  author       = {Shambhu J. Upadhyaya},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Real-Time Intrusion Detection with Emphasis on Insider Attacks},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {82--85},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_6},
  doi          = {10.1007/978-3-540-45215-7\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Upadhyaya03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/WangZZ03,
  author       = {Shuozhong Wang and
                  Xinpeng Zhang and
                  Kaiwen Zhang},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Data Hiding in Digital Audio by Frequency Domain Dithering},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {383--394},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_33},
  doi          = {10.1007/978-3-540-45215-7\_33},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/WangZZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/WeeM03,
  author       = {Kyubum Wee and
                  Byungeun Moon},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Automatic Generation of Finite State Automata for Detecting Intrusions
                  Using System Call Sequences},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {206--216},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_17},
  doi          = {10.1007/978-3-540-45215-7\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/WeeM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/WolfS03,
  author       = {Ruben Wolf and
                  Markus Schneider},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Context-Dependent Access Control for Web-Based Collaboration Environments
                  with Role-based Approach},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {267--278},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_22},
  doi          = {10.1007/978-3-540-45215-7\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/WolfS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/YumKL03,
  author       = {Dae Hyun Yum and
                  Jae Eun Kang and
                  Pil Joong Lee},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Advanced Certificate Status Protocol},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {229--240},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_19},
  doi          = {10.1007/978-3-540-45215-7\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/YumKL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZK03,
  author       = {Peter D. Zegzhda and
                  Dmitry P. Zegzhda and
                  Maxim O. Kalinin},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Logical Resolving for Security Evaluation},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {147--156},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_12},
  doi          = {10.1007/978-3-540-45215-7\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZhangWZ03,
  author       = {Kaiwen Zhang and
                  Shuozhong Wang and
                  Xinpeng Zhang},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Detection and Removal of Hidden Data in Images Embedded with Quantization
                  Index Modulation},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {360--370},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_31},
  doi          = {10.1007/978-3-540-45215-7\_31},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZhangWZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZhangWZ03a,
  author       = {Xinpeng Zhang and
                  Shuozhong Wang and
                  Kaiwen Zhang},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Steganography with Least Histogram Abnormality},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {395--406},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_34},
  doi          = {10.1007/978-3-540-45215-7\_34},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZhangWZ03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZhangWZ03b,
  author       = {Xinpeng Zhang and
                  Shuozhong Wang and
                  Kaiwen Zhang},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {407--418},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_35},
  doi          = {10.1007/978-3-540-45215-7\_35},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZhangWZ03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2003,
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b12005},
  doi          = {10.1007/B12005},
  isbn         = {3-540-40797-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Barker01,
  author       = {Steve Barker},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {{TRBAC:} {A} Temporal Authorization Model},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {178--188},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_19},
  doi          = {10.1007/3-540-45116-1\_19},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Barker01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Cervesato01,
  author       = {Iliano Cervesato},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Typed {MSR:} Syntax and Examples},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {159--177},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_18},
  doi          = {10.1007/3-540-45116-1\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Cervesato01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ChaddoudCS01,
  author       = {Ghassan Chaddoud and
                  Isabelle Chrisment and
                  Andr{\'{e}} Schaff},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Dynamic Group Key Management Protocol},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {251--262},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_25},
  doi          = {10.1007/3-540-45116-1\_25},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ChaddoudCS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DasguptaG01,
  author       = {Dipankar Dasgupta and
                  Fabio A. Gonz{\'{a}}lez},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {An Intelligent Decision Support System for Intrusion Detection and
                  Response},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_1},
  doi          = {10.1007/3-540-45116-1\_1},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DasguptaG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DuranteFG01,
  author       = {Antonio Durante and
                  Riccardo Focardi and
                  Roberto Gorrieri},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {{CVS} at Work: {A} Report on New Failures upon Some Cryptographic
                  Protocols},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {287--299},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_28},
  doi          = {10.1007/3-540-45116-1\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DuranteFG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GootsMM01,
  author       = {Nick D. Goots and
                  Alexander A. Moldovyan and
                  Nick A. Moldovyan},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Fast Encryption Algorithm Spectr-H64},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {275--286},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_27},
  doi          = {10.1007/3-540-45116-1\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GootsMM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GorodetskiKKKPS01,
  author       = {Vladimir I. Gorodetski and
                  Oleg Karsaev and
                  Alexey Khabalov and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Agent-Based Model of Computer Network Security System: {A} Case Study},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {39--50},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_7},
  doi          = {10.1007/3-540-45116-1\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GorodetskiKKKPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GorodetskiPSS01,
  author       = {Vladimir I. Gorodetski and
                  Leonard J. Popyack and
                  Vladimir Samoilov and
                  Victor A. Skormin},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {SVD-Based Approach to Transparent Embedding Data into Digital Images},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {263--274},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_26},
  doi          = {10.1007/3-540-45116-1\_26},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GorodetskiPSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GritzalisMK01,
  author       = {Dimitris Gritzalis and
                  Konstantinos Moulinos and
                  Konstantinos Kostis},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {A Privacy-Enhancing e-Business Model Based on Infomediaries},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {72--83},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_10},
  doi          = {10.1007/3-540-45116-1\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GritzalisMK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Grusho01,
  author       = {Alexander A. Grusho},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Mathematical Models of the Covert Channels},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {15--20},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_2},
  doi          = {10.1007/3-540-45116-1\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Grusho01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Heitmeyer01,
  author       = {Constance L. Heitmeyer},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Applying Practical Formal Methods to the Specification and Analysis
                  of Security Properties},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {84--89},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_11},
  doi          = {10.1007/3-540-45116-1\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Heitmeyer01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/IzotovMM01,
  author       = {Boris V. Izotov and
                  Alexander A. Moldovyan and
                  Nick A. Moldovyan},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Controlled Operations as a Cryptographic Primitive},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {230--241},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_23},
  doi          = {10.1007/3-540-45116-1\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/IzotovMM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Jurjens01,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Composability of Secrecy},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {28--38},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_6},
  doi          = {10.1007/3-540-45116-1\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Jurjens01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KavutY01,
  author       = {Sel{\c{c}}uk Kavut and
                  Melek D. Y{\"{u}}cel},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {On Some Cryptographic Properties of Rijndael},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {300--312},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_29},
  doi          = {10.1007/3-540-45116-1\_29},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KavutY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KnorrW01,
  author       = {Konstantin Knorr and
                  Harald Weidner},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Analyzing Separation of Duties in Petri Net Workflows},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {102--114},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_13},
  doi          = {10.1007/3-540-45116-1\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KnorrW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KorjikM01,
  author       = {Valeri Korjik and
                  Kirill Morozov},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Generalized Oblivious Transfer Protocols Based on Noisy Channels},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {219--229},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_22},
  doi          = {10.1007/3-540-45116-1\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KorjikM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Kostogryzov01,
  author       = {Andrey Kostogryzov},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Modeling Software Tools Complex for Evaluation of Information Systems
                  Operation Quality {(CEISOQ)}},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {90--101},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_12},
  doi          = {10.1007/3-540-45116-1\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Kostogryzov01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Meadows01,
  author       = {Catherine Meadows},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Open Issues in Formal Methods for Cryptographic Protocol Analysis},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {21},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_3},
  doi          = {10.1007/3-540-45116-1\_3},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Meadows01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/RyutovN01,
  author       = {Tatyana Ryutov and
                  B. Clifford Neuman},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {The Set and Function Approach to Modeling Authorization in Distributed
                  Systems},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {189--206},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_20},
  doi          = {10.1007/3-540-45116-1\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/RyutovN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Sandhu01,
  author       = {Ravi S. Sandhu},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Future Directions in Role-Based Access Control Models},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {22--26},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_4},
  doi          = {10.1007/3-540-45116-1\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Sandhu01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SeleznyovMP01,
  author       = {Alexandr Seleznyov and
                  Oleksiy Mazhelis and
                  Seppo Puuronen},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Learning Temporal Regularities of User Behavior for Anomaly Detection},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {143--152},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_16},
  doi          = {10.1007/3-540-45116-1\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SeleznyovMP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SinghFLD01,
  author       = {Harjit Singh and
                  Steven Furnell and
                  Benn Lines and
                  Paul Dowland},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Investigating and Evaluating Behavioural Profiling and Intrusion Detection
                  Using Data Mining},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {153--158},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_17},
  doi          = {10.1007/3-540-45116-1\_17},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SinghFLD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SkorminDMGPGT01,
  author       = {Victor A. Skormin and
                  Jos{\'{e}} G. Delgado{-}Frias and
                  Dennis L. McGee and
                  Joseph Giordano and
                  Leonard J. Popyack and
                  Vladimir I. Gorodetski and
                  Alexander O. Tarakanov},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {{BASIS:} {A} Biological Approach to System Information Security},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {127--142},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_15},
  doi          = {10.1007/3-540-45116-1\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SkorminDMGPGT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Smirnov01,
  author       = {Michael Smirnov},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Security Considerations and Models for Service Creation in Premium
                  {IP} Networks},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {51--62},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_8},
  doi          = {10.1007/3-540-45116-1\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Smirnov01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Tarakanov01,
  author       = {Alexander O. Tarakanov},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Information Security with Formal Immune Networks},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {115--126},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_14},
  doi          = {10.1007/3-540-45116-1\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Tarakanov01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Varadharajan01,
  author       = {Vijay Varadharajan},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Secure Networked Computing},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {27},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_5},
  doi          = {10.1007/3-540-45116-1\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Varadharajan01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/YakovlevKS01,
  author       = {Viktor Yakovlev and
                  Valery Korjik and
                  Alexander Sinuk},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Key Distribution Protocol Based on Noisy Channel and Error Detecting
                  Codes},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {242--250},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_24},
  doi          = {10.1007/3-540-45116-1\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/YakovlevKS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZegzhdaSO01,
  author       = {Dmitry P. Zegzhda and
                  Pavel G. Stepanov and
                  Alexey D. Otavin},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Fenix Secure Operating System: Principles, Models and Architecture},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {207--218},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_21},
  doi          = {10.1007/3-540-45116-1\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZegzhdaSO01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZ01,
  author       = {Peter D. Zegzhda and
                  Dmitry P. Zegzhda},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Secure Systems Design Technology},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {63--71},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_9},
  doi          = {10.1007/3-540-45116-1\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2001,
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1},
  doi          = {10.1007/3-540-45116-1},
  isbn         = {3-540-42103-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}