BibTeX record conf/esorics/LaszkaJSGB13

download as .bib file

@inproceedings{DBLP:conf/esorics/LaszkaJSGB13,
  author    = {Aron Laszka and
               Benjamin Johnson and
               Pascal Sch{\"{o}}ttle and
               Jens Grossklags and
               Rainer B{\"{o}}hme},
  title     = {Managing the Weakest Link - {A} Game-Theoretic Approach for the Mitigation
               of Insider Threats},
  booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
               in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  pages     = {273--290},
  year      = {2013},
  crossref  = {DBLP:conf/esorics/2013},
  url       = {https://doi.org/10.1007/978-3-642-40203-6\_16},
  doi       = {10.1007/978-3-642-40203-6\_16},
  timestamp = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/LaszkaJSGB13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2013,
  editor    = {Jason Crampton and
               Sushil Jajodia and
               Keith Mayes},
  title     = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
               in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8134},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40203-6},
  doi       = {10.1007/978-3-642-40203-6},
  isbn      = {978-3-642-40202-9},
  timestamp = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics