BibTeX record conf/securecomm/MoralesAXS10

download as .bib file

@inproceedings{DBLP:conf/securecomm/MoralesAXS10,
  author    = {Jose Andre Morales and
               Areej Al{-}Bataineh and
               Shouhuai Xu and
               Ravi S. Sandhu},
  title     = {Analyzing and Exploiting Network Behaviors of Malware},
  booktitle = {Security and Privacy in Communication Networks - 6th Iternational
               {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
               Proceedings},
  pages     = {20--34},
  year      = {2010},
  crossref  = {DBLP:conf/securecomm/2010},
  url       = {https://doi.org/10.1007/978-3-642-16161-2\_2},
  doi       = {10.1007/978-3-642-16161-2\_2},
  timestamp = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/MoralesAXS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2010,
  editor    = {Sushil Jajodia and
               Jianying Zhou},
  title     = {Security and Privacy in Communication Networks - 6th Iternational
               {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
               Proceedings},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {50},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16161-2},
  doi       = {10.1007/978-3-642-16161-2},
  isbn      = {978-3-642-16160-5},
  timestamp = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics