BibTeX records: Brian P. Van Leeuwen

download as .bib file

@inproceedings{DBLP:conf/iccst/StoutLUTSD18,
  author    = {William M. S. Stout and
               Brian P. Van Leeuwen and
               Vincent E. Urias and
               Julian Tuminaro and
               Spencer Schrock and
               Nomaan Dossaji},
  title     = {Leveraging a LiveNirtual/Constructive Testbed for the Evaluation of
               Moving Target Defenses},
  booktitle = {2018 International Carnahan Conference on Security Technology, {ICCST}
               2018, Montreal, QC, Canada, October 22-25, 2018},
  pages     = {1--5},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/CCST.2018.8585478},
  doi       = {10.1109/CCST.2018.8585478},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/iccst/StoutLUTSD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/UriasLSL18,
  author    = {Vincent E. Urias and
               Brian P. Van Leeuwen and
               William M. S. Stout and
               Han Lin},
  title     = {Applying a Threat Model to Cloud Computing},
  booktitle = {2018 International Carnahan Conference on Security Technology, {ICCST}
               2018, Montreal, QC, Canada, October 22-25, 2018},
  pages     = {1--5},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/CCST.2018.8585471},
  doi       = {10.1109/CCST.2018.8585471},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/iccst/UriasLSL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/UriasSLL18,
  author    = {Vincent E. Urias and
               William M. S. Stout and
               Brian P. Van Leeuwen and
               Han Lin},
  title     = {Cyber Range Infrastructure Limitations and Needs of Tomorrow: {A}
               Position Paper},
  booktitle = {2018 International Carnahan Conference on Security Technology, {ICCST}
               2018, Montreal, QC, Canada, October 22-25, 2018},
  pages     = {1--5},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/CCST.2018.8585460},
  doi       = {10.1109/CCST.2018.8585460},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/iccst/UriasSLL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sc2/UriasSLL18,
  author    = {Vincent E. Urias and
               William M. S. Stout and
               Caleb Loverro and
               Brian P. Van Leeuwen},
  title     = {Get Your Head Out of the Clouds: The Illusion of Confidentiality {\&}
               Privacy},
  booktitle = {8th {IEEE} International Symposium on Cloud and Service Computing,
               {SC2} 2018, Paris, France, November 18-21, 2018},
  pages     = {57--66},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/SC2.2018.00015},
  doi       = {10.1109/SC2.2018.00015},
  timestamp = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl    = {https://dblp.org/rec/conf/sc2/UriasSLL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/LeeuwenEU17,
  author    = {Brian P. Van Leeuwen and
               John Eldridge and
               Vincent Urias},
  title     = {Cyber analysis emulation platform for wireless communication network
               protocols},
  booktitle = {International Carnahan Conference on Security Technology, {ICCST}
               2017, Madrid, Spain, October 23-26, 2017},
  pages     = {1--6},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://doi.org/10.1109/CCST.2017.8167803},
  doi       = {10.1109/CCST.2017.8167803},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/iccst/LeeuwenEU17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/LeeuwenSU16,
  author    = {Brian P. Van Leeuwen and
               William M. S. Stout and
               Vincent Urias},
  title     = {{MTD} assessment framework with cyber attack modeling},
  booktitle = {{IEEE} International Carnahan Conference on Security Technology, {ICCST}
               2016, Orlando, FL, USA, October 24-27, 2016},
  pages     = {1--8},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://doi.org/10.1109/CCST.2016.7815722},
  doi       = {10.1109/CCST.2016.7815722},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/iccst/LeeuwenSU16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/LeeuwenSU16,
  author    = {Brian P. Van Leeuwen and
               William M. S. Stout and
               Vincent E. Urias},
  editor    = {Jerry Brand and
               Matthew C. Valenti and
               Akinwale Akinpelu and
               Bharat T. Doshi and
               Bonnie L. Gorsic},
  title     = {Empirical assessment of network-based Moving Target Defense approaches},
  booktitle = {2016 {IEEE} Military Communications Conference, {MILCOM} 2016, Baltimore,
               MD, USA, November 1-3, 2016},
  pages     = {764--769},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://doi.org/10.1109/MILCOM.2016.7795421},
  doi       = {10.1109/MILCOM.2016.7795421},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/conf/milcom/LeeuwenSU16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/LeeuwenSU15,
  author    = {Brian P. Van Leeuwen and
               William M. S. Stout and
               Vincent Urias},
  editor    = {Qinqing Zhang and
               Jerry Brand and
               Thomas G. MacDonald and
               Bharat T. Doshi and
               Bonnie L. Gorsic},
  title     = {Operational cost of deploying Moving Target Defenses defensive work
               factors},
  booktitle = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
               FL, USA, October 26-28, 2015},
  pages     = {966--971},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {https://doi.org/10.1109/MILCOM.2015.7357570},
  doi       = {10.1109/MILCOM.2015.7357570},
  timestamp = {Thu, 07 Nov 2019 09:04:27 +0100},
  biburl    = {https://dblp.org/rec/conf/milcom/LeeuwenSU15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/LeeuwenUGI13,
  author    = {Brian P. Van Leeuwen and
               Vincent Urias and
               Casey Glatter and
               Alex Interrante{-}Grant},
  editor    = {Joe Senftle and
               Mike Beltrani and
               Kari Karwedsky},
  title     = {Testbed for Cellular Telecommunications Cyber Vulnerability Analysis},
  booktitle = {32th {IEEE} Military Communications Conference, {MILCOM} 2013, San
               Diego, CA, USA, November 18-20, 2013},
  pages     = {1391--1397},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://doi.org/10.1109/MILCOM.2013.236},
  doi       = {10.1109/MILCOM.2013.236},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/conf/milcom/LeeuwenUGI13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/MinerLWESLL12,
  author    = {Nadine E. Miner and
               Brian P. Van Leeuwen and
               Kimberly M. Welch and
               M. Donan Estill and
               Mark A. Smith and
               Hai D. Le and
               Craig R. Lawton},
  title     = {Evaluating communications system performance effects at a system of
               systems level},
  booktitle = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando,
               FL, USA, October 29 - November 1, 2012},
  pages     = {1--6},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {https://doi.org/10.1109/MILCOM.2012.6415686},
  doi       = {10.1109/MILCOM.2012.6415686},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/conf/milcom/MinerLWESLL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/UriasLR12,
  author    = {Vincent Urias and
               Brian P. Van Leeuwen and
               Bryan Richardson},
  title     = {Supervisory Command and Data Acquisition {(SCADA)} system cyber security
               analysis using a live, virtual, and constructive {(LVC)} testbed},
  booktitle = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando,
               FL, USA, October 29 - November 1, 2012},
  pages     = {1--8},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {https://doi.org/10.1109/MILCOM.2012.6415818},
  doi       = {10.1109/MILCOM.2012.6415818},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/conf/milcom/UriasLR12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics