Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/crisis/crisis2018.bht:"
@proceedings{DBLP:conf/crisis/2018, editor = {Akka Zemmari and Mohamed Mosbah and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11391}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12143-3}, doi = {10.1007/978-3-030-12143-3}, isbn = {978-3-030-12142-6}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/AbdelghaniZAS18, author = {Wafa Abdelghani and Corinne Amel Zayani and Ikram Amous and Florence S{\`{e}}des}, title = {Trust Evaluation Model for Attack Detection in Social Internet of Things}, booktitle = {CRiSIS}, pages = {48--64}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_5}, doi = {10.1007/978-3-030-12143-3\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/AbdelghaniZAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/AlashwaliS18, author = {Eman Salem Alashwali and Pawel Szalachowski}, title = {{DSTC:} DNS-Based Strict {TLS} Configurations}, booktitle = {CRiSIS}, pages = {93--109}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_9}, doi = {10.1007/978-3-030-12143-3\_9}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/AlashwaliS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/AytacECA18, author = {Samet Ayta{\c{c}} and Orhan Ermis and Mehmet Ufuk {\c{C}}aglayan and Fatih Alag{\"{o}}z}, title = {Authenticated Quality of Service Aware Routing in Software Defined Networks}, booktitle = {CRiSIS}, pages = {110--127}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_10}, doi = {10.1007/978-3-030-12143-3\_10}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/AytacECA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/BartoliLMT18, author = {Alberto Bartoli and Andrea De Lorenzo and Eric Medvet and Fabiano Tarlao}, title = {Personalized, Browser-Based Visual Phishing Detection Based on Deep Learning}, booktitle = {CRiSIS}, pages = {80--85}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_7}, doi = {10.1007/978-3-030-12143-3\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/BartoliLMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/BayouECC18, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems}, booktitle = {CRiSIS}, pages = {35--40}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_3}, doi = {10.1007/978-3-030-12143-3\_3}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/BayouECC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/BkakriaTCCBF18, author = {Anis Bkakria and Aimilia Tasidou and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Fatma Bouattour and Feten Ben Fredj}, title = {Optimal Distribution of Privacy Budget in Differential Privacy}, booktitle = {CRiSIS}, pages = {222--236}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_18}, doi = {10.1007/978-3-030-12143-3\_18}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/BkakriaTCCBF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/ChabanneKP18, author = {Herv{\'{e}} Chabanne and Julien Keuffer and Emmanuel Prouff}, title = {Outsourcing Signatures of Confidential Documents}, booktitle = {CRiSIS}, pages = {41--47}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_4}, doi = {10.1007/978-3-030-12143-3\_4}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/ChabanneKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/CremilleuxBMP18, author = {Damien Cr{\'{e}}milleux and Christophe Bidan and Fr{\'{e}}d{\'{e}}ric Majorczyk and Nicolas Prigent}, title = {Enhancing Collaboration Between Security Analysts in Security Operations Centers}, booktitle = {CRiSIS}, pages = {136--142}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_12}, doi = {10.1007/978-3-030-12143-3\_12}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/CremilleuxBMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/DeI18, author = {Sourya Joyee De and Abdessamad Imine}, title = {On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper)}, booktitle = {CRiSIS}, pages = {128--135}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_11}, doi = {10.1007/978-3-030-12143-3\_11}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/DeI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/Es-SalhiEC18, author = {Khaoula Es{-}Salhi and David Espes and Nora Cuppens}, title = {{RIICS:} Risk Based {IICS} Segmentation Method}, booktitle = {CRiSIS}, pages = {143--157}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_13}, doi = {10.1007/978-3-030-12143-3\_13}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/Es-SalhiEC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/KomeCCF18, author = {Ivan Marco Lobe Kome and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Vincent Frey}, title = {A Certificate-Less Key Exchange Protocol for IoT}, booktitle = {CRiSIS}, pages = {65--79}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_6}, doi = {10.1007/978-3-030-12143-3\_6}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/KomeCCF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/LounisZ18, author = {Karim Lounis and Mohammad Zulkernine}, title = {Connection Dumping Vulnerability Affecting Bluetooth Availability}, booktitle = {CRiSIS}, pages = {188--204}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_16}, doi = {10.1007/978-3-030-12143-3\_16}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/LounisZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/MurvayG18, author = {Pal{-}Stefan Murvay and Bogdan Groza}, title = {Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol}, booktitle = {CRiSIS}, pages = {172--187}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_15}, doi = {10.1007/978-3-030-12143-3\_15}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/MurvayG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/SaharanLGZ18, author = {Shweta Saharan and Vijay Laxmi and Manoj Singh Gaur and Akka Zemmari}, title = {Privacy Preserving Data Offloading Based on Transformation}, booktitle = {CRiSIS}, pages = {86--92}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_8}, doi = {10.1007/978-3-030-12143-3\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/SaharanLGZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/SmineCC18, author = {Manel Smine and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense}, booktitle = {CRiSIS}, pages = {158--171}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_14}, doi = {10.1007/978-3-030-12143-3\_14}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/SmineCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/ViertelKWS18, author = {Fabien Patrick Viertel and Fabian Kortum and Leif Wagner and Kurt Schneider}, title = {Are Third-Party Libraries Secure? {A} Software Library Checker for Java}, booktitle = {CRiSIS}, pages = {18--34}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_2}, doi = {10.1007/978-3-030-12143-3\_2}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/ViertelKWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/Volden-FrebergE18, author = {Vetle Volden{-}Freberg and Gencer Erdogan}, title = {An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams}, booktitle = {CRiSIS}, pages = {1--17}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_1}, doi = {10.1007/978-3-030-12143-3\_1}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/Volden-FrebergE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/WirtzH18, author = {Roman Wirtz and Maritta Heisel}, title = {A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements}, booktitle = {CRiSIS}, pages = {205--221}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_17}, doi = {10.1007/978-3-030-12143-3\_17}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/WirtzH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.