BibTeX records: Patrik Lantz

download as .bib file

@inproceedings{DBLP:conf/fase/Henda0LNSS17,
  author       = {Noomene Ben Henda and
                  Bj{\"{o}}rn Johansson and
                  Patrik Lantz and
                  Karl Norrman and
                  Pasi Saarinen and
                  Oskar Segersv{\"{a}}rd},
  editor       = {Marieke Huisman and
                  Julia Rubin},
  title        = {OpenSAW: Open Security Analysis Workbench},
  booktitle    = {Fundamental Approaches to Software Engineering - 20th International
                  Conference, {FASE} 2017, Held as Part of the European Joint Conferences
                  on Theory and Practice of Software, {ETAPS} 2017, Uppsala, Sweden,
                  April 22-29, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10202},
  pages        = {321--337},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54494-5\_18},
  doi          = {10.1007/978-3-662-54494-5\_18},
  timestamp    = {Fri, 09 Apr 2021 18:43:03 +0200},
  biburl       = {https://dblp.org/rec/conf/fase/Henda0LNSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/JamthagenLH16,
  author       = {Christopher J{\"{a}}mthagen and
                  Patrik Lantz and
                  Martin Hell},
  editor       = {Amund Skavhaug and
                  J{\'{e}}r{\'{e}}mie Guiochet and
                  Friedemann Bitsch},
  title        = {Exploiting Trust in Deterministic Builds},
  booktitle    = {Computer Safety, Reliability, and Security - 35th International Conference,
                  {SAFECOMP} 2016, Trondheim, Norway, September 21-23, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9922},
  pages        = {238--249},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45477-1\_19},
  doi          = {10.1007/978-3-319-45477-1\_19},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/JamthagenLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LantzJHS15,
  author       = {Patrik Lantz and
                  Bj{\"{o}}rn Johansson and
                  Martin Hell and
                  Ben J. M. Smeets},
  editor       = {Michael Brenner and
                  Nicolas Christin and
                  Benjamin Johnson and
                  Kurt Rohloff},
  title        = {Visual Cryptography and Obfuscation: {A} Use-Case for Decrypting and
                  Deobfuscating Information Using Augmented Reality},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2015 International
                  Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January
                  30, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8976},
  pages        = {261--273},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48051-9\_19},
  doi          = {10.1007/978-3-662-48051-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/LantzJHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/LantzJ15,
  author       = {Patrik Lantz and
                  Bj{\"{o}}rn Johansson},
  title        = {Towards bridging the gap between Dalvik bytecode and native code during
                  static analysis of Android applications},
  booktitle    = {International Wireless Communications and Mobile Computing Conference,
                  {IWCMC} 2015, Dubrovnik, Croatia, August 24-28, 2015},
  pages        = {587--593},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IWCMC.2015.7289149},
  doi          = {10.1109/IWCMC.2015.7289149},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/LantzJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/AlazabMBLT12,
  author       = {Moutaz Alazab and
                  Veelasha Moonsamy and
                  Lynn Margaret Batten and
                  Patrik Lantz and
                  Ronghua Tian},
  title        = {Analysis of Malicious and Benign Android Applications},
  booktitle    = {32nd International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2012 Workshops), Macau, China, June 18-21, 2012},
  pages        = {608--616},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDCSW.2012.13},
  doi          = {10.1109/ICDCSW.2012.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/AlazabMBLT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics