Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Erhan J. Kartaltepe
@inproceedings{DBLP:conf/acns/KartaltepeMXS10, author = {Erhan J. Kartaltepe and Jose Andre Morales and Shouhuai Xu and Ravi S. Sandhu}, editor = {Jianying Zhou and Moti Yung}, title = {Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {511--528}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_30}, doi = {10.1007/978-3-642-13708-2\_30}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KartaltepeMXS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MoralesKXS10, author = {Jose Andre Morales and Erhan J. Kartaltepe and Shouhuai Xu and Ravi S. Sandhu}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Symptoms-Based Detection of Bot Processes}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {229--241}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_18}, doi = {10.1007/978-3-642-14706-7\_18}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/MoralesKXS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/KartaltepePX07, author = {Erhan J. Kartaltepe and T. Paul Parker and Shouhuai Xu}, editor = {Feng Bao and San Ling and Tatsuaki Okamoto and Huaxiong Wang and Chaoping Xing}, title = {How to Secure Your Email Address Book and Beyond}, booktitle = {Cryptology and Network Security, 6th International Conference, {CANS} 2007, Singapore, December 8-10, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4856}, pages = {228--246}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76969-9\_15}, doi = {10.1007/978-3-540-76969-9\_15}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/KartaltepePX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/KartaltepeX06, author = {Erhan J. Kartaltepe and Shouhuai Xu}, title = {Towards Blocking Outgoing Malicious Impostor Emails}, booktitle = {2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), 26-29 June 2006, Buffalo, New York, USA, Proceedings}, pages = {657--661}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/WOWMOM.2006.109}, doi = {10.1109/WOWMOM.2006.109}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/KartaltepeX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwap/KartaltepeX05, author = {Erhan J. Kartaltepe and Shouhuai Xu}, editor = {Jianying Zhou and Meng{-}Chow Kang and Feng Bao and HweeHwa Pang}, title = {On Automatically Detecting Malicious Impostor Emails}, booktitle = {Applied Public Key Infrastructure - 4th International Workshop: {IWAP} 2005, Singapore, September 21-23, 2005}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {128}, pages = {33--47}, publisher = {{IOS} Press}, year = {2005}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1227}, timestamp = {Mon, 06 Nov 2017 02:05:53 +0100}, biburl = {https://dblp.org/rec/conf/iwap/KartaltepeX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.