BibTeX records: Erhan J. Kartaltepe

download as .bib file

@inproceedings{DBLP:conf/acns/KartaltepeMXS10,
  author       = {Erhan J. Kartaltepe and
                  Jose Andre Morales and
                  Shouhuai Xu and
                  Ravi S. Sandhu},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Social Network-Based Botnet Command-and-Control: Emerging Threats
                  and Countermeasures},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {511--528},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_30},
  doi          = {10.1007/978-3-642-13708-2\_30},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KartaltepeMXS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MoralesKXS10,
  author       = {Jose Andre Morales and
                  Erhan J. Kartaltepe and
                  Shouhuai Xu and
                  Ravi S. Sandhu},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Symptoms-Based Detection of Bot Processes},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {229--241},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_18},
  doi          = {10.1007/978-3-642-14706-7\_18},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MoralesKXS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KartaltepePX07,
  author       = {Erhan J. Kartaltepe and
                  T. Paul Parker and
                  Shouhuai Xu},
  editor       = {Feng Bao and
                  San Ling and
                  Tatsuaki Okamoto and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {How to Secure Your Email Address Book and Beyond},
  booktitle    = {Cryptology and Network Security, 6th International Conference, {CANS}
                  2007, Singapore, December 8-10, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4856},
  pages        = {228--246},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76969-9\_15},
  doi          = {10.1007/978-3-540-76969-9\_15},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/KartaltepePX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/KartaltepeX06,
  author       = {Erhan J. Kartaltepe and
                  Shouhuai Xu},
  title        = {Towards Blocking Outgoing Malicious Impostor Emails},
  booktitle    = {2006 International Symposium on a World of Wireless, Mobile and Multimedia
                  Networks (WoWMoM 2006), 26-29 June 2006, Buffalo, New York, USA, Proceedings},
  pages        = {657--661},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/WOWMOM.2006.109},
  doi          = {10.1109/WOWMOM.2006.109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/KartaltepeX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwap/KartaltepeX05,
  author       = {Erhan J. Kartaltepe and
                  Shouhuai Xu},
  editor       = {Jianying Zhou and
                  Meng{-}Chow Kang and
                  Feng Bao and
                  HweeHwa Pang},
  title        = {On Automatically Detecting Malicious Impostor Emails},
  booktitle    = {Applied Public Key Infrastructure - 4th International Workshop: {IWAP}
                  2005, Singapore, September 21-23, 2005},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {128},
  pages        = {33--47},
  publisher    = {{IOS} Press},
  year         = {2005},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1227},
  timestamp    = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl       = {https://dblp.org/rec/conf/iwap/KartaltepeX05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics