BibTeX records: Elizabeth Stinson

download as .bib file

@inproceedings{DBLP:conf/uss/BriesemeisterDLSTDKSOM10,
  author       = {Linda Briesemeister and
                  Steven Dawson and
                  Patrick Lincoln and
                  Hassen Sa{\"{\i}}di and
                  Jim Thornton and
                  Glenn Durfee and
                  Peter C. S. Kwan and
                  Elizabeth Stinson and
                  Adam J. Oliner and
                  John C. Mitchell},
  editor       = {Nadav Aharony and
                  Yaniv Altshuler and
                  Yuval Elovici},
  title        = {Homogeneity as an Advantage: It Takes a Community to Protect an Application},
  booktitle    = {2010 Workshop on Collaborative Methods for Security and Privacy, CollSec'10,
                  Washington, D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/collsec10/homogeneity-advantage-it-takes-community-protect-application},
  timestamp    = {Mon, 01 Feb 2021 08:42:51 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BriesemeisterDLSTDKSOM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MartignoniSFJM08,
  author       = {Lorenzo Martignoni and
                  Elizabeth Stinson and
                  Matt Fredrikson and
                  Somesh Jha and
                  John C. Mitchell},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {A Layered Architecture for Detecting Malicious Behaviors},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {78--97},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_5},
  doi          = {10.1007/978-3-540-87403-4\_5},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MartignoniSFJM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StinsonM08,
  author       = {Elizabeth Stinson and
                  John C. Mitchell},
  editor       = {Dan Boneh and
                  Tal Garfinkel and
                  Dug Song},
  title        = {Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection
                  Methods},
  booktitle    = {2nd {USENIX} Workshop on Offensive Technologies, WOOT'08, San Jose,
                  CA, USA, July 28, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/woot08/tech/full\_papers/stinson/stinson.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StinsonM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/StinsonM08,
  author       = {Elizabeth Stinson and
                  John C. Mitchell},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Characterizing Bots' Remote Control Behavior},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {45--64},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_3},
  doi          = {10.1007/978-0-387-68768-1\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/StinsonM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/StinsonM07,
  author       = {Elizabeth Stinson and
                  John C. Mitchell},
  editor       = {Bernhard M. H{\"{a}}mmerli and
                  Robin Sommer},
  title        = {Characterizing Bots' Remote Control Behavior},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  4th International Conference, {DIMVA} 2007, Lucerne, Switzerland,
                  July 12-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4579},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73614-1\_6},
  doi          = {10.1007/978-3-540-73614-1\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/StinsonM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics