Search dblp for Publications

export results for "stream:streams/conf/ec2nd:"

 download as .bib file

@inproceedings{DBLP:conf/ec2nd/AlmgrenP11,
  author       = {Magnus Almgren and
                  Marina Papatriantafilou},
  title        = {Discussion Panel in conjunction with the 7th European Conference on
                  Computer Network Defense {(EC2ND} 2011): Security Issues in the Smart
                  Grid},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {62--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.11},
  doi          = {10.1109/EC2ND.2011.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/AlmgrenP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/CostacheTAPS11,
  author       = {Mihai Costache and
                  Valentin Tudor and
                  Magnus Almgren and
                  Marina Papatriantafilou and
                  Christopher Saunders},
  title        = {Remote Control of Smart Meters: Friend or Foe?},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {49--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.14},
  doi          = {10.1109/EC2ND.2011.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/CostacheTAPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/DietrichRFBSP11,
  author       = {Christian J. Dietrich and
                  Christian Rossow and
                  Felix C. Freiling and
                  Herbert Bos and
                  Maarten van Steen and
                  Norbert Pohlmann},
  title        = {On Botnets That Use {DNS} for Command and Control},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.16},
  doi          = {10.1109/EC2ND.2011.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/DietrichRFBSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/Fu11,
  author       = {Zhang Fu},
  title        = {Mitigating Distributed Denial-of-Service Attacks: Application-Defense
                  and Network-Defense Methods},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {59},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.18},
  doi          = {10.1109/EC2ND.2011.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/Fu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/GessiouVI11,
  author       = {Eleni Gessiou and
                  Quang Hieu Vu and
                  Sotiris Ioannidis},
  title        = {{IRILD:} An Information Retrieval Based Method for Information Leak
                  Detection},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {33--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.21},
  doi          = {10.1109/EC2ND.2011.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/GessiouVI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/Greschbach11,
  author       = {Benjamin Greschbach},
  title        = {Location Privacy: User-Centric Threat Analysis},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {58},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.9},
  doi          = {10.1109/EC2ND.2011.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/Greschbach11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/HadziosmanovicB11,
  author       = {Dina Hadziosmanovic and
                  Damiano Bolzoni and
                  Pieter H. Hartel and
                  Sandro Etalle},
  title        = {{MELISSA:} Towards Automated Detection of Undesirable User Actions
                  in Critical Infrastructures},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {41--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.10},
  doi          = {10.1109/EC2ND.2011.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/HadziosmanovicB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/KontaxisPPM11,
  author       = {Georgios Kontaxis and
                  Iasonas Polakis and
                  Michalis Polychronakis and
                  Evangelos P. Markatos},
  title        = {dead.drop: URL-Based Stealthy Messaging},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {17--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.15},
  doi          = {10.1109/EC2ND.2011.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/KontaxisPPM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/LarssonT11,
  author       = {Andreas Larsson and
                  Philippas Tsigas},
  title        = {Security in Wireless Sensor Networks},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {61},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.13},
  doi          = {10.1109/EC2ND.2011.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/LarssonT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/MoradiOT11,
  author       = {Farnaz Moradi and
                  Tomas Olovsson and
                  Philippas Tsigas},
  title        = {The Anti-Social Behavior of Spam},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {57},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.20},
  doi          = {10.1109/EC2ND.2011.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/MoradiOT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/PolakisKI11,
  author       = {Iasonas Polakis and
                  Georgios Kontaxis and
                  Sotiris Ioannidis},
  title        = {CAPTCHuring Automated (Smart)Phone Attacks},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {60},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.19},
  doi          = {10.1109/EC2ND.2011.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/PolakisKI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/SchwenkR11,
  author       = {Guido Schwenk and
                  Konrad Rieck},
  title        = {Adaptive Detection of Covert Communication in {HTTP} Requests},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {25--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.12},
  doi          = {10.1109/EC2ND.2011.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/SchwenkR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/VijayakumarSJ11,
  author       = {Hayawardh Vijayakumar and
                  Joshua Schiffman and
                  Trent Jaeger},
  title        = {A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.17},
  doi          = {10.1109/EC2ND.2011.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/VijayakumarSJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ec2nd/2011,
  title        = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6377154/proceeding},
  isbn         = {978-1-4673-2116-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ec2nd/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics