Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/mmmacns/mmmacns2012.bht:"
@inproceedings{DBLP:conf/mmmacns/AvanesovCRT12, author = {Tigran Avanesov and Yannick Chevalier and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Towards the Orchestration of Secured Services under Non-disclosure Policies}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {130--145}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_12}, doi = {10.1007/978-3-642-33704-8\_12}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/AvanesovCRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/CadenheadKKT12, author = {Tyrone Cadenhead and Murat Kantarcioglu and Vaibhav Khadilkar and Bhavani Thuraisingham}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Design and Implementation of a Cloud-Based Assured Information Sharing System}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {36--50}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_4}, doi = {10.1007/978-3-642-33704-8\_4}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/CadenheadKKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ChechulinKD12, author = {Andrey Chechulin and Igor V. Kotenko and Vasily Desnitsky}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {An Approach for Network Information Flow Analysis for Systems of Embedded Components}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {146--155}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_13}, doi = {10.1007/978-3-642-33704-8\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ChechulinKD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DesharnaisKT12, author = {Jos{\'{e}}e Desharnais and Erwanne P. Kanyabwero and Nadia Tawbi}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Enforcing Information Flow Policies by a Three-Valued Analysis}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {114--129}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_11}, doi = {10.1007/978-3-642-33704-8\_11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DesharnaisKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DesnitskyKC12, author = {Vasily Desnitsky and Igor V. Kotenko and Andrey Chechulin}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Configuration-Based Approach to Embedded Device Security}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {270--285}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_23}, doi = {10.1007/978-3-642-33704-8\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DesnitskyKC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DiniMSS12, author = {Gianluca Dini and Fabio Martinelli and Andrea Saracino and Daniele Sgandurra}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {{MADAM:} {A} Multi-level Anomaly Detector for Android Malware}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {240--253}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_21}, doi = {10.1007/978-3-642-33704-8\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DiniMSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DolgikhNSB12, author = {Andrey M. Dolgikh and Tomas Nykodym and Victor A. Skormin and Zachary Birnbaum}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {191--202}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_17}, doi = {10.1007/978-3-642-33704-8\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DolgikhNSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GranadilloDJGA12, author = {Gustavo {Gonzalez Granadillo} and Herv{\'{e}} Debar and Gr{\'{e}}goire Jacob and Chrystel Gaber and Mohammed Achemlal}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Individual Countermeasure Selection Based on the Return On Response Investment Index}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {156--170}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_14}, doi = {10.1007/978-3-642-33704-8\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GranadilloDJGA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GrushoGT12, author = {Alexander A. Grusho and Nikolai A. Grusho and Elena E. Timonina}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Alternative Mechanisms for Information Security}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {108--113}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_10}, doi = {10.1007/978-3-642-33704-8\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GrushoGT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/JinSK12, author = {Xin Jin and Ravi S. Sandhu and Ram Krishnan}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {{RABAC:} Role-Centric Attribute-Based Access Control}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {84--96}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_8}, doi = {10.1007/978-3-642-33704-8\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/JinSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KerriganC12, author = {Brendan Kerrigan and Yu Chen}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {286--298}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_24}, doi = {10.1007/978-3-642-33704-8\_24}, timestamp = {Thu, 10 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KerriganC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KomashinskiyK12, author = {Dmitriy Komashinskiy and Igor V. Kotenko}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {254--269}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_22}, doi = {10.1007/978-3-642-33704-8\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KomashinskiyK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Livshits12, author = {Benjamin Livshits}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Finding Malware on a Web Scale}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {1--2}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_1}, doi = {10.1007/978-3-642-33704-8\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Livshits12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MartinelliMM12, author = {Fabio Martinelli and Ilaria Matteucci and Charles Morisset}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {From Qualitative to Quantitative Enforcement of Security Policy}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {22--35}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_3}, doi = {10.1007/978-3-642-33704-8\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MartinelliMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MoldovyanMN12, author = {Alexander A. Moldovyan and Nikolay A. Moldovyan and Evgenia Novikova}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Blind 384-bit Digital Signature Scheme}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {77--83}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_7}, doi = {10.1007/978-3-642-33704-8\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MoldovyanMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MustaphaDJ12, author = {Yosra Ben Mustapha and Herv{\'{e}} Debar and Gr{\'{e}}goire Jacob}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {203--217}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_18}, doi = {10.1007/978-3-642-33704-8\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MustaphaDJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Oleshchuk12, author = {Vladimir A. Oleshchuk}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Trust-Aware {RBAC}}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {97--107}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_9}, doi = {10.1007/978-3-642-33704-8\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Oleshchuk12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/RiekeCHPG12, author = {Roland Rieke and Luigi Coppolino and Andrew Hutchison and Elsa Prieto and Chrystel Gaber}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Security and Reliability Requirements for Advanced Security Event Management}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {171--180}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_15}, doi = {10.1007/978-3-642-33704-8\_15}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/RiekeCHPG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SchutteRW12, author = {Julian Sch{\"{u}}tte and Roland Rieke and Timo Winkelvos}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Model-Based Security Event Management}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {181--190}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_16}, doi = {10.1007/978-3-642-33704-8\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SchutteRW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/TsayM12, author = {Joe{-}Kai Tsay and Stig Fr. Mj{\o}lsnes}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {A Vulnerability in the {UMTS} and {LTE} Authentication and Key Agreement Protocols}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {65--76}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_6}, doi = {10.1007/978-3-642-33704-8\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/TsayM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/WangJMS12, author = {Zhaohui Wang and Ryan Johnson and Rahul Murmuria and Angelos Stavrou}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Exposing Security Risks for Commercial Mobile Devices}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {3--21}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_2}, doi = {10.1007/978-3-642-33704-8\_2}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/WangJMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/YakovlevKBM12, author = {Viktor Yakovlev and Valery I. Korzhik and Mihail Bakaev and Guillermo Morales{-}Luna}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {51--64}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_5}, doi = {10.1007/978-3-642-33704-8\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/YakovlevKBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/YavvariTRS12, author = {Chaitanya Yavvari and Arnur G. Tokhtabayev and Huzefa Rangwala and Angelos Stavrou}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Malware Characterization Using Behavioral Components}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {226--239}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_20}, doi = {10.1007/978-3-642-33704-8\_20}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/YavvariTRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZegzhdaS12, author = {Dmitry P. Zegzhda and Tatiana V. Stepanova}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {218--225}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_19}, doi = {10.1007/978-3-642-33704-8\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ZegzhdaS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZKK12, author = {Peter D. Zegzhda and Dmitry P. Zegzhda and Maxim O. Kalinin and Artem S. Konoplev}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Security Modeling of Grid Systems Using Petri Nets}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {299--308}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_25}, doi = {10.1007/978-3-642-33704-8\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ZegzhdaZN12, author = {Peter D. Zegzhda and Dmitry P. Zegzhda and Alexey V. Nikolskiy}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Using Graph Theory for Cloud System Security Modeling}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {309--318}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_26}, doi = {10.1007/978-3-642-33704-8\_26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ZegzhdaZN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmmacns/2012, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8}, doi = {10.1007/978-3-642-33704-8}, isbn = {978-3-642-33703-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.