BibTeX records: John Henry Castellanos

download as .bib file

@inproceedings{DBLP:conf/acns/Castellanos019,
  author    = {John Henry Castellanos and
               Jianying Zhou},
  editor    = {Robert H. Deng and
               Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
               Mart{\'{\i}}n Ochoa and
               Moti Yung},
  title     = {A Modular Hybrid Learning Approach for Black-Box Security Testing
               of {CPS}},
  booktitle = {Applied Cryptography and Network Security - 17th International Conference,
               {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11464},
  pages     = {196--216},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-21568-2\_10},
  doi       = {10.1007/978-3-030-21568-2\_10},
  timestamp = {Wed, 29 May 2019 12:25:55 +0200},
  biburl    = {https://dblp.org/rec/conf/acns/Castellanos019.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HarilalTHCGMO18,
  author    = {Athul Harilal and
               Flavio Toffalini and
               Ivan Homoliak and
               John Henry Castellanos and
               Juan Guarnizo and
               Soumik Mondal and
               Mart{\'{\i}}n Ochoa},
  title     = {The Wolf Of {SUTD} {(TWOS):} {A} Dataset of Malicious Insider Threat
               Behavior Based on a Gamified Competition},
  journal   = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume    = {9},
  number    = {1},
  pages     = {54--85},
  year      = {2018},
  url       = {https://doi.org/10.22667/JOWUA.2018.03.31.054},
  doi       = {10.22667/JOWUA.2018.03.31.054},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jowua/HarilalTHCGMO18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CastellanosO018,
  author    = {John Henry Castellanos and
               Mart{\'{\i}}n Ochoa and
               Jianying Zhou},
  title     = {Finding Dependencies between Cyber-Physical Domains for Security Testing
               of Industrial Control Systems},
  booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference,
               {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages     = {582--594},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3274694.3274745},
  doi       = {10.1145/3274694.3274745},
  timestamp = {Wed, 05 Dec 2018 09:44:25 +0100},
  biburl    = {https://dblp.org/rec/conf/acsac/CastellanosO018.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CastellanosATO17,
  author    = {John Henry Castellanos and
               Daniele Antonioli and
               Nils Ole Tippenhauer and
               Mart{\'{\i}}n Ochoa},
  editor    = {Dieter Gollmann and
               Atsuko Miyaji and
               Hiroaki Kikuchi},
  title     = {Legacy-Compliant Data Authentication for Industrial Control System
               Traffic},
  booktitle = {Applied Cryptography and Network Security - 15th International Conference,
               {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10355},
  pages     = {665--685},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-61204-1\_33},
  doi       = {10.1007/978-3-319-61204-1\_33},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/acns/CastellanosATO17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HarilalTCGHO17,
  author    = {Athul Harilal and
               Flavio Toffalini and
               John Henry Castellanos and
               Juan Guarnizo and
               Ivan Homoliak and
               Mart{\'{\i}}n Ochoa},
  title     = {{TWOS:} {A} Dataset of Malicious Insider Threat Behavior Based on
               a Gamified Competition},
  booktitle = {Proceedings of the 2017 International Workshop on Managing Insider
               Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages     = {45--56},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3139923.3139929},
  doi       = {10.1145/3139923.3139929},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ccs/HarilalTCGHO17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChekoleCOY17,
  author    = {Eyasu Getahun Chekole and
               John Henry Castellanos and
               Mart{\'{\i}}n Ochoa and
               David K. Y. Yau},
  editor    = {Sokratis K. Katsikas and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Nora Cuppens and
               Costas Lambrinoudakis and
               Christos Kalloniatis and
               John Mylopoulos and
               Annie I. Ant{\'{o}}n and
               Stefanos Gritzalis},
  title     = {Enforcing Memory Safety in Cyber-Physical Systems},
  booktitle = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS
               2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10683},
  pages     = {127--144},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72817-9\_9},
  doi       = {10.1007/978-3-319-72817-9\_9},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/esorics/ChekoleCOY17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/CastellanosWOR16,
  author    = {John Henry Castellanos and
               Tobias W{\"{u}}chner and
               Mart{\'{\i}}n Ochoa and
               Sandra Julieta Rueda},
  editor    = {Aditya Mathur and
               Abhik Roychoudhury},
  title     = {Q-Floid: Android Malware detection with Quantitative Data Flow Graphs},
  booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
               2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series    = {Cryptology and Information Security Series},
  volume    = {14},
  pages     = {13--25},
  publisher = {{IOS} Press},
  year      = {2016},
  url       = {https://doi.org/10.3233/978-1-61499-617-0-13},
  doi       = {10.3233/978-1-61499-617-0-13},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/sgcrc/CastellanosWOR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics