Search dblp for Publications

export results for "toc:db/conf/crisis/crisis2018.bht:"

 download as .bib file

@proceedings{DBLP:conf/crisis/2018,
  editor       = {Akka Zemmari and
                  Mohamed Mosbah and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Risks and Security of Internet and Systems - 13th International Conference,
                  CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11391},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12143-3},
  doi          = {10.1007/978-3-030-12143-3},
  isbn         = {978-3-030-12142-6},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/AbdelghaniZAS18,
  author       = {Wafa Abdelghani and
                  Corinne Amel Zayani and
                  Ikram Amous and
                  Florence S{\`{e}}des},
  title        = {Trust Evaluation Model for Attack Detection in Social Internet of
                  Things},
  booktitle    = {CRiSIS},
  pages        = {48--64},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_5},
  doi          = {10.1007/978-3-030-12143-3\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/AbdelghaniZAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/AlashwaliS18,
  author       = {Eman Salem Alashwali and
                  Pawel Szalachowski},
  title        = {{DSTC:} DNS-Based Strict {TLS} Configurations},
  booktitle    = {CRiSIS},
  pages        = {93--109},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_9},
  doi          = {10.1007/978-3-030-12143-3\_9},
  timestamp    = {Fri, 25 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/AlashwaliS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/AytacECA18,
  author       = {Samet Ayta{\c{c}} and
                  Orhan Ermis and
                  Mehmet Ufuk {\c{C}}aglayan and
                  Fatih Alag{\"{o}}z},
  title        = {Authenticated Quality of Service Aware Routing in Software Defined
                  Networks},
  booktitle    = {CRiSIS},
  pages        = {110--127},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_10},
  doi          = {10.1007/978-3-030-12143-3\_10},
  timestamp    = {Fri, 25 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/AytacECA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/BartoliLMT18,
  author       = {Alberto Bartoli and
                  Andrea De Lorenzo and
                  Eric Medvet and
                  Fabiano Tarlao},
  title        = {Personalized, Browser-Based Visual Phishing Detection Based on Deep
                  Learning},
  booktitle    = {CRiSIS},
  pages        = {80--85},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_7},
  doi          = {10.1007/978-3-030-12143-3\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/BartoliLMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/BayouECC18,
  author       = {Lyes Bayou and
                  David Espes and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {A Prediction-Based Method for False Data Injection Attacks Detection
                  in Industrial Control Systems},
  booktitle    = {CRiSIS},
  pages        = {35--40},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_3},
  doi          = {10.1007/978-3-030-12143-3\_3},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/BayouECC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/BkakriaTCCBF18,
  author       = {Anis Bkakria and
                  Aimilia Tasidou and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Fatma Bouattour and
                  Feten Ben Fredj},
  title        = {Optimal Distribution of Privacy Budget in Differential Privacy},
  booktitle    = {CRiSIS},
  pages        = {222--236},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_18},
  doi          = {10.1007/978-3-030-12143-3\_18},
  timestamp    = {Fri, 25 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/BkakriaTCCBF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/ChabanneKP18,
  author       = {Herv{\'{e}} Chabanne and
                  Julien Keuffer and
                  Emmanuel Prouff},
  title        = {Outsourcing Signatures of Confidential Documents},
  booktitle    = {CRiSIS},
  pages        = {41--47},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_4},
  doi          = {10.1007/978-3-030-12143-3\_4},
  timestamp    = {Fri, 25 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/ChabanneKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/CremilleuxBMP18,
  author       = {Damien Cr{\'{e}}milleux and
                  Christophe Bidan and
                  Fr{\'{e}}d{\'{e}}ric Majorczyk and
                  Nicolas Prigent},
  title        = {Enhancing Collaboration Between Security Analysts in Security Operations
                  Centers},
  booktitle    = {CRiSIS},
  pages        = {136--142},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_12},
  doi          = {10.1007/978-3-030-12143-3\_12},
  timestamp    = {Fri, 25 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/CremilleuxBMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/DeI18,
  author       = {Sourya Joyee De and
                  Abdessamad Imine},
  title        = {On Consent in Online Social Networks: Privacy Impacts and Research
                  Directions (Short Paper)},
  booktitle    = {CRiSIS},
  pages        = {128--135},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_11},
  doi          = {10.1007/978-3-030-12143-3\_11},
  timestamp    = {Fri, 25 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/DeI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/Es-SalhiEC18,
  author       = {Khaoula Es{-}Salhi and
                  David Espes and
                  Nora Cuppens},
  title        = {{RIICS:} Risk Based {IICS} Segmentation Method},
  booktitle    = {CRiSIS},
  pages        = {143--157},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_13},
  doi          = {10.1007/978-3-030-12143-3\_13},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/Es-SalhiEC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/KomeCCF18,
  author       = {Ivan Marco Lobe Kome and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Vincent Frey},
  title        = {A Certificate-Less Key Exchange Protocol for IoT},
  booktitle    = {CRiSIS},
  pages        = {65--79},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_6},
  doi          = {10.1007/978-3-030-12143-3\_6},
  timestamp    = {Fri, 25 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/KomeCCF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/LounisZ18,
  author       = {Karim Lounis and
                  Mohammad Zulkernine},
  title        = {Connection Dumping Vulnerability Affecting Bluetooth Availability},
  booktitle    = {CRiSIS},
  pages        = {188--204},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_16},
  doi          = {10.1007/978-3-030-12143-3\_16},
  timestamp    = {Fri, 25 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/LounisZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/MurvayG18,
  author       = {Pal{-}Stefan Murvay and
                  Bogdan Groza},
  title        = {Practical Security Exploits of the FlexRay In-Vehicle Communication
                  Protocol},
  booktitle    = {CRiSIS},
  pages        = {172--187},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_15},
  doi          = {10.1007/978-3-030-12143-3\_15},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/MurvayG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/SaharanLGZ18,
  author       = {Shweta Saharan and
                  Vijay Laxmi and
                  Manoj Singh Gaur and
                  Akka Zemmari},
  title        = {Privacy Preserving Data Offloading Based on Transformation},
  booktitle    = {CRiSIS},
  pages        = {86--92},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_8},
  doi          = {10.1007/978-3-030-12143-3\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/SaharanLGZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/SmineCC18,
  author       = {Manel Smine and
                  Nora Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Effectiveness and Impact Measurements of a Diversification Based Moving
                  Target Defense},
  booktitle    = {CRiSIS},
  pages        = {158--171},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_14},
  doi          = {10.1007/978-3-030-12143-3\_14},
  timestamp    = {Fri, 25 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/SmineCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/ViertelKWS18,
  author       = {Fabien Patrick Viertel and
                  Fabian Kortum and
                  Leif Wagner and
                  Kurt Schneider},
  title        = {Are Third-Party Libraries Secure? {A} Software Library Checker for
                  Java},
  booktitle    = {CRiSIS},
  pages        = {18--34},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_2},
  doi          = {10.1007/978-3-030-12143-3\_2},
  timestamp    = {Fri, 25 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/ViertelKWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/Volden-FrebergE18,
  author       = {Vetle Volden{-}Freberg and
                  Gencer Erdogan},
  title        = {An Empirical Study on the Comprehensibility of Graphical Security
                  Risk Models Based on Sequence Diagrams},
  booktitle    = {CRiSIS},
  pages        = {1--17},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_1},
  doi          = {10.1007/978-3-030-12143-3\_1},
  timestamp    = {Fri, 25 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/Volden-FrebergE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/WirtzH18,
  author       = {Roman Wirtz and
                  Maritta Heisel},
  title        = {A Systematic Method to Describe and Identify Security Threats Based
                  on Functional Requirements},
  booktitle    = {CRiSIS},
  pages        = {205--221},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_17},
  doi          = {10.1007/978-3-030-12143-3\_17},
  timestamp    = {Fri, 25 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/WirtzH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics