Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/IEEEares/ares2019.bht:"
@inproceedings{DBLP:conf/IEEEares/0003GM19, author = {Lucian Popa and Bogdan Groza and Pal{-}Stefan Murvay}, title = {Performance Evaluation of Elliptic Curve Libraries on Automotive-Grade Microcontrollers}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {100:1--100:7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341480}, doi = {10.1145/3339252.3341480}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/0003GM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AignerZ19, author = {Alexander Aigner and Rene Zeller}, title = {{HEHLKAPPE:} Utilizing Deep Learning to Manipulate Surveillance Camera Footage in Real-Time}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {56:1--56:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340102}, doi = {10.1145/3339252.3340102}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AignerZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AlashwaliSM19, author = {Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin}, title = {Does "www." Mean Better Transport Layer Security?}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {23:1--23:7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339277}, doi = {10.1145/3339252.3339277}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AlashwaliSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AlnaimAF19, author = {Abdulrahman Khalid Alnaim and Ahmed Mahmoud Alwakeel and Eduardo B. Fern{\'{a}}ndez}, title = {A Misuse Pattern for Compromising VMs via Virtual Machine Escape in {NFV}}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {77:1--77:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340530}, doi = {10.1145/3339252.3340530}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AlnaimAF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AlwakeelAF19, author = {Ahmed Mahmoud Alwakeel and Abdulrahman Khalid Alnaim and Eduardo B. Fern{\'{a}}ndez}, title = {A Pattern for a Virtual Network Function {(VNF)}}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {31:1--31:7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340519}, doi = {10.1145/3339252.3340519}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AlwakeelAF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Amthor0KS19, author = {Peter Amthor and Daniel Fischer and Winfried E. K{\"{u}}hnhauser and Dirk Stelzer}, title = {Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {86:1--86:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340509}, doi = {10.1145/3339252.3340509}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Amthor0KS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AndaLKBBLS19, author = {Felix Anda and David Lillis and Aikaterini Kanta and Brett A. Becker and Elias Bou{-}Harb and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {57:1--57:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341491}, doi = {10.1145/3339252.3341491}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/AndaLKBBLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AnkeleMNV19, author = {Ralph Ankele and Stefan Marksteiner and Kai Nahrgang and Heribert Vallant}, title = {Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {102:1--102:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341482}, doi = {10.1145/3339252.3341482}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AnkeleMNV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AntonFS19, author = {Simon D. Duque Ant{\'{o}}n and Daniel Fraunholz and Hans Dieter Schotten}, title = {Using Temporal and Topological Features for Intrusion Detection in Operational Networks}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {99:1--99:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341476}, doi = {10.1145/3339252.3341476}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AntonFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AtamliPC19, author = {Ahmad Atamli and Giuseppe Petracca and Jon Crowcroft}, title = {IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud {IOMMU} based systems}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {45:1--45:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340511}, doi = {10.1145/3339252.3340511}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AtamliPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BagAH19, author = {Samiran Bag and Muhammad Ajmal Azad and Feng Hao}, title = {{E2E} Verifiable Borda Count Voting System without Tallying Authorities}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {11:1--11:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339259}, doi = {10.1145/3339252.3339259}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BagAH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Bartos19, author = {V{\'{a}}clav Bartos}, title = {{NERD:} Network Entity Reputation Database}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {84:1--84:7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340512}, doi = {10.1145/3339252.3340512}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Bartos19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BelairLM19, author = {Maxime B{\'{e}}lair and Sylvie Laniepce and Jean{-}Marc Menaud}, title = {Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {76:1--76:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340502}, doi = {10.1145/3339252.3340502}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BelairLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BerenjestanakiC19, author = {Mohammad Hajian Berenjestanaki and Mauro Conti and Ankit Gangwal}, title = {On the Exploitation of Online {SMS} Receiving Services to Forge {ID} Verification}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {22:1--22:5}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339276}, doi = {10.1145/3339252.3339276}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BerenjestanakiC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BernieriCP19, author = {Giuseppe Bernieri and Mauro Conti and Gabriele Pozzan}, title = {{AMON:} an Automaton MONitor for Industrial Cyber-Physical Security}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {33:1--33:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340521}, doi = {10.1145/3339252.3340521}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BernieriCP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BlazyBP19, author = {Olivier Blazy and Laura Brouilhet and Duong Hieu Phan}, title = {Anonymous Identity Based Encryption with Traceable Identities}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {13:1--13:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339271}, doi = {10.1145/3339252.3339271}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BlazyBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BlazyCV19, author = {Olivier Blazy and C{\'{e}}line Chevalier and Quoc{-}Huy Vu}, title = {Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {28:1--28:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339280}, doi = {10.1145/3339252.3339280}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BlazyCV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BotacinKG19, author = {Marcus Botacin and Anatoli Kalysch and Andr{\'{e}} Gr{\'{e}}gio}, title = {The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms based on a Brazilian case study}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {49:1--49:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340103}, doi = {10.1145/3339252.3340103}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BotacinKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BuccafurriALMR19, author = {Francesco Buccafurri and Vincenzo De Angelis and Gianluca Lax and Lorenzo Musarella and Antonia Russo}, title = {An Attribute-Based Privacy-Preserving Ethereum Solution for Service Delivery with Accountability Requirements}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {24:1--24:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339279}, doi = {10.1145/3339252.3339279}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BuccafurriALMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BurdaBA19, author = {Pavlo Burda and Coen Boot and Luca Allodi}, title = {Characterizing the Redundancy of DarkWeb .onion Services}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {19:1--19:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339273}, doi = {10.1145/3339252.3339273}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BurdaBA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BuschlingerSZ19, author = {Lucas Buschlinger and Markus Springer and Maria Zhdanova}, title = {Plug-and-Patch: Secure Value Added Services for Electric Vehicle Charging}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {2:1--2:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339269}, doi = {10.1145/3339252.3339269}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BuschlingerSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CabajGMNZ19, author = {Krzysztof Cabaj and Marcin Gregorczyk and Wojciech Mazurczyk and Piotr Nowakowski and Piotr Z{\'{o}}rawski}, title = {Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {108:1--108:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341494}, doi = {10.1145/3339252.3341494}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CabajGMNZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CabajMNZ19, author = {Krzysztof Cabaj and Wojciech Mazurczyk and Piotr Nowakowski and Piotr Z{\'{o}}rawski}, title = {Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {65:1--65:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341489}, doi = {10.1145/3339252.3341489}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CabajMNZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CaesarS19, author = {Matthias Caesar and Jan Steffan}, title = {A Location Privacy Analysis of Bluetooth Mesh}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {97:1--97:7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340507}, doi = {10.1145/3339252.3340507}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CaesarS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Calderoni19, author = {Luca Calderoni}, title = {Preserving context security in {AWS} IoT Core}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {78:1--78:5}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340499}, doi = {10.1145/3339252.3340499}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Calderoni19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ChoSZ19, author = {Joo Yeon Cho and Andrew Sergeev and Jim Zou}, title = {Securing Ethernet-based Optical Fronthaul for 5G Network}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {106:1--106:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341484}, doi = {10.1145/3339252.3341484}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ChoSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ChorasPKDKG19, author = {Michal Choras and Marek Pawlicki and Rafal Kozik and Konstantinos P. Demestichas and Pavlos Kosmides and Manik Gupta}, title = {SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {68:1--68:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341497}, doi = {10.1145/3339252.3341497}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ChorasPKDKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CledelCC19, author = {Thomas Cl{\'{e}}del and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Managing the Overestimation of Resilience}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {35:1--35:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340333}, doi = {10.1145/3339252.3340333}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CledelCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ContiGT19, author = {Mauro Conti and Ankit Gangwal and Michele Todero}, title = {Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {16:1--16:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339255}, doi = {10.1145/3339252.3339255}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ContiGT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CurtinGGKM19, author = {Ryan R. Curtin and Andrew B. Gardner and Slawomir Grzonkowski and Alexey Kleymenov and Alejandro Mosquera}, title = {Detecting {DGA} domains with recurrent neural networks and side information}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {20:1--20:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339258}, doi = {10.1145/3339252.3339258}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CurtinGGKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DamKBS19, author = {Tobias Dam and Lukas Daniel Klausner and Damjan Buhov and Sebastian Schrittwieser}, title = {Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {53:1--53:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340332}, doi = {10.1145/3339252.3340332}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/DamKBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DamT19, author = {Khanh{-}Huu{-}The Dam and Tayssir Touili}, title = {{STAMAD:} a STAtic MAlware Detector}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {25:1--25:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339274}, doi = {10.1145/3339252.3339274}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/DamT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DernaikaCCR19, author = {Farah Dernaika and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Olivier Raynaud}, title = {Semantic Mediation for {A} Posteriori Log Analysis}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {88:1--88:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340104}, doi = {10.1145/3339252.3340104}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/DernaikaCCR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DollSO019, author = {Christian Doll and Arnold Sykosch and Marc Ohm and Michael Meier}, title = {Automated Pattern Inference Based on Repeatedly Observed Malware Artifacts}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {82:1--82:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340510}, doi = {10.1145/3339252.3340510}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/DollSO019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DominguesR19, author = {Patr{\'{\i}}cio Domingues and Alexandre Fraz{\~{a}}o Ros{\'{a}}rio}, title = {Deep Learning-based Facial Detection and Recognition in Still Images for Digital Forensics}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {40:1--40:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340107}, doi = {10.1145/3339252.3340107}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/DominguesR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DoynikovaFK19, author = {Elena Doynikova and Andrey Fedorchenko and Igor V. Kotenko}, title = {Ontology of Metrics for Cyber Security Assessment}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {52:1--52:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341496}, doi = {10.1145/3339252.3341496}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/DoynikovaFK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DuS19, author = {Xiaoyu Du and Mark Scanlon}, title = {Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {43:1--43:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340517}, doi = {10.1145/3339252.3340517}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/DuS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/EnglbrechtLPQ19, author = {Ludwig Englbrecht and Gregor Langner and G{\"{u}}nther Pernul and Gerald Quirchmayr}, title = {Enhancing credibility of digital evidence through provenance-based incident response handling}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {26:1--26:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339275}, doi = {10.1145/3339252.3339275}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/EnglbrechtLPQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Es-SalhiEC19, author = {Khaoula Es{-}Salhi and David Espes and Nora Cuppens}, title = {{DTE} Access Control Model for Integrated {ICS} Systems}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {79:1--79:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340498}, doi = {10.1145/3339252.3340498}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Es-SalhiEC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FeichtnerR19, author = {Johannes Feichtner and Christof Rabensteiner}, title = {Obfuscation-Resilient Code Recognition in Android Apps}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {8:1--8:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339260}, doi = {10.1145/3339252.3339260}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/FeichtnerR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FujsMV19, author = {Damjan Fujs and Anze Mihelic and Simon L. R. Vrhovec}, title = {The power of interpretation: Qualitative methods in cybersecurity research}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {92:1--92:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341479}, doi = {10.1145/3339252.3341479}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/FujsMV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GhaeiniTZ19, author = {Hamid Reza Ghaeini and Nils Ole Tippenhauer and Jianying Zhou}, title = {Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {80:1--80:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340331}, doi = {10.1145/3339252.3340331}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/GhaeiniTZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GiannetsosK19, author = {Thanassis Giannetsos and Ioannis Krontiris}, title = {Securing {V2X} Communications for the Future: Can {PKI} Systems offer the answer?}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {95:1--95:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340523}, doi = {10.1145/3339252.3340523}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/GiannetsosK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GobelTB19, author = {Thomas G{\"{o}}bel and Jan T{\"{u}}rr and Harald Baier}, title = {Revisiting Data Hiding Techniques for Apple File System}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {41:1--41:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340524}, doi = {10.1145/3339252.3340524}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/GobelTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GrossAM19, author = {Tobias Gro{\ss} and Matanat Ahmadova and Tilo M{\"{u}}ller}, title = {Analyzing Android's File-Based Encryption: Information Leakage through Unencrypted Metadata}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {47:1--47:7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340340}, doi = {10.1145/3339252.3340340}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/GrossAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Halvani0G19, author = {Oren Halvani and Christian Winter and Lukas Graner}, title = {Assessing the Applicability of Authorship Verification Methods}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {38:1--38:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340508}, doi = {10.1145/3339252.3340508}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Halvani0G19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HammH019, author = {Peter Hamm and David Harborth and Sebastian Pape}, title = {A Systematic Analysis of User Evaluations in Security Research}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {91:1--91:7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340339}, doi = {10.1145/3339252.3340339}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/HammH019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HassenfeldtBBZ19, author = {Courtney Hassenfeldt and Shabana Baig and Ibrahim M. Baggili and Xiaolu Zhang}, title = {Map My Murder: {A} Digital Forensic Study of Mobile Health and Fitness Applications}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {42:1--42:12}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340515}, doi = {10.1145/3339252.3340515}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/HassenfeldtBBZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HittmeirEM19, author = {Markus Hittmeir and Andreas Ekelhart and Rudolf Mayer}, title = {On the Utility of Synthetic Data: An Empirical Evaluation on Machine Learning Tasks}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {29:1--29:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339281}, doi = {10.1145/3339252.3339281}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HittmeirEM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HorakSH19, author = {Martin Hor{\'{a}}k and V{\'{a}}clav Stupka and Martin Hus{\'{a}}k}, title = {{GDPR} Compliance in Cybersecurity Software: {A} Case Study of {DPIA} in Information Sharing Platform}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {36:1--36:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340516}, doi = {10.1145/3339252.3340516}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/HorakSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HusakK19, author = {Martin Hus{\'{a}}k and Jaroslav Kaspar}, title = {{AIDA} Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {81:1--81:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340513}, doi = {10.1145/3339252.3340513}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HusakK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/IliouKTKVK19, author = {Christos Iliou and Theodoros Kostoulas and Theodora Tsikrika and Vasilis Katos and Stefanos Vrochidis and Yiannis Kompatsiaris}, title = {Towards a framework for detecting advanced Web bots}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {18:1--18:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339267}, doi = {10.1145/3339252.3339267}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/IliouKTKVK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/IqbalKS19, author = {Junaid Iqbal and Ratinder Kaur and Natalia Stakhanova}, title = {PoliDOM: Mitigation of {DOM-XSS} by Detection and Prevention of Unauthorized {DOM} Tampering}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {17:1--17:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339257}, doi = {10.1145/3339252.3339257}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/IqbalKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/JavedSJ19, author = {Yousra Javed and Shashank Sethi and Akshay Jadoun}, title = {Alexa's Voice Recording Behavior: {A} Survey of User Understanding and Awareness}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {89:1--89:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340330}, doi = {10.1145/3339252.3340330}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/JavedSJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/JavornikKH19, author = {Michal Javorn{\'{\i}}k and Jana Kom{\'{a}}rkov{\'{a}} and Martin Hus{\'{a}}k}, title = {Decision Support for Mission-Centric Cyber Defence}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {34:1--34:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340522}, doi = {10.1145/3339252.3340522}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/JavornikKH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Kantola19, author = {Raimo Kantola}, title = {6G Network Needs to Support Embedded Trust}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {104:1--104:5}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341498}, doi = {10.1145/3339252.3341498}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Kantola19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KarakocNE19, author = {Ferhat Karako{\c{c}} and Majid Nateghizad and Zekeriya Erkin}, title = {{SET-OT:} {A} Secure Equality Testing Protocol Based on Oblivious Transfer}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {12:1--12:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339264}, doi = {10.1145/3339252.3339264}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KarakocNE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KrennSS19, author = {Stephan Krenn and Kai Samelin and Christoph Striecks}, title = {Practical Group-Signatures with Privacy-Friendly Openings}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {10:1--10:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339256}, doi = {10.1145/3339252.3339256}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KrennSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KuppaGAL19, author = {Aditya Kuppa and Slawomir Grzonkowski and Muhammad Rizwan Asghar and Nhien{-}An Le{-}Khac}, title = {Black Box Attacks on Deep Anomaly Detectors}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {21:1--21:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339266}, doi = {10.1145/3339252.3339266}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KuppaGAL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LeanderCH19, author = {Bj{\"{o}}rn Leander and Aida Causevic and Hans Hansson}, title = {Applicability of the {IEC} 62443 standard in Industry 4.0 / IIoT}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {101:1--101:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341481}, doi = {10.1145/3339252.3341481}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/LeanderCH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LiWSL19, author = {Zhuohua Li and Jincheng Wang and Mingshen Sun and John C. S. Lui}, title = {Securing the Device Drivers of Your Embedded Systems: Framework and Prototype}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {71:1--71:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340506}, doi = {10.1145/3339252.3340506}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/LiWSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LiuSS19, author = {Huajian Liu and Martin Steinebach and Kathrin Sch{\"{o}}lei}, title = {Improved Manipulation Detection with Convolutional Neural Network for {JPEG} Images}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {39:1--39:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340526}, doi = {10.1145/3339252.3340526}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/LiuSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LunaAC19, author = {Donatello Luna and Luca Allodi and Marco Cremonini}, title = {Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {67:1--67:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341495}, doi = {10.1145/3339252.3341495}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/LunaAC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MadaniV19, author = {Pooria Madani and Natalija Vlajic}, title = {Near-optimal Evasion of Randomized Convex-inducing Classifiers in Adversarial Environments}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {32:1--32:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340520}, doi = {10.1145/3339252.3340520}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MadaniV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MahainiLS19, author = {Mohamad Imad Mahaini and Shujun Li and Rahime Belen Saglam}, title = {Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {30:1--30:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339282}, doi = {10.1145/3339252.3339282}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MahainiLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MainaliS19, author = {Pradip Mainali and Carlton Shepherd}, title = {Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party Computation}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {73:1--73:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340500}, doi = {10.1145/3339252.3340500}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MainaliS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MainaliSP19, author = {Pradip Mainali and Carlton Shepherd and Fabien A. P. Petitcolas}, title = {Privacy-Enhancing Context Authentication from Location-Sensitive Data}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {87:1--87:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340334}, doi = {10.1145/3339252.3340334}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MainaliSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MalinaSDHF19, author = {Lukas Malina and Gautam Srivastava and Petr Dzurenda and Jan Hajny and Radek Fujdiak}, title = {A Secure Publish/Subscribe Protocol for Internet of Things}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {75:1--75:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340503}, doi = {10.1145/3339252.3340503}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/MalinaSDHF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MartinoQL19, author = {Mariano Di Martino and Peter Quax and Wim Lamotte}, title = {Realistically Fingerprinting Social Media Webpages in {HTTPS} Traffic}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {54:1--54:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341478}, doi = {10.1145/3339252.3341478}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MartinoQL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MarzouguiK19, author = {Soundes Marzougui and Juliane Kr{\"{a}}mer}, title = {Post-Quantum Cryptography in Embedded Systems}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {48:1--48:7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341475}, doi = {10.1145/3339252.3341475}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MarzouguiK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MazurczykSWC19, author = {Wojciech Mazurczyk and Przemyslaw Szary and Steffen Wendzel and Luca Caviglione}, title = {Towards Reversible Storage Network Covert Channels}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {69:1--69:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341493}, doi = {10.1145/3339252.3341493}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MazurczykSWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MikhaylovFPVMM19, author = {Konstantin Mikhaylov and Radek Fujdiak and Ari Pouttu and Miroslav Vozn{\'{a}}k and Lukas Malina and Petr Mlynek}, title = {Energy Attack in LoRaWAN: Experimental Validation}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {74:1--74:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340525}, doi = {10.1145/3339252.3340525}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MikhaylovFPVMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Moeckel19, author = {Caroline Moeckel}, title = {Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {93:1--93:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340341}, doi = {10.1145/3339252.3340341}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Moeckel19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MuellerZN19, author = {Tobias Mueller and Ephraim Zimmer and Ludovico de Nittis}, title = {Using Context and Provenance to defend against USB-borne attacks}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {1:1--1:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339268}, doi = {10.1145/3339252.3339268}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/MuellerZN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MuschWJR19, author = {Marius Musch and Christian Wressnegger and Martin Johns and Konrad Rieck}, title = {Thieves in the Browser: Web-based Cryptojacking in the Wild}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {4:1--4:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339261}, doi = {10.1145/3339252.3339261}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MuschWJR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/NguyenAMLW19, author = {Khuong An Nguyen and Raja Naeem Akram and Konstantinos Markantonakis and Zhiyuan Luo and Chris Watkins}, title = {Location Tracking Using Smartphone Accelerometer and Magnetometer Traces}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {96:1--96:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340518}, doi = {10.1145/3339252.3340518}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/NguyenAMLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ParkerYACJT19, author = {Luke R. Parker and Paul D. Yoo and A. Taufiq Asyhari and Lounis Chermak and Yoonchan Jhi and Kamal Taha}, title = {DEMISe: Interpretable Deep Extraction and Mutual Information Selection Techniques for IoT Intrusion Detection}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {98:1--98:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340497}, doi = {10.1145/3339252.3340497}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ParkerYACJT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PekaricSF19, author = {Irdin Pekaric and Clemens Sauerwein and Michael Felderer}, title = {Applying Security Testing Techniques to Automotive Engineering}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {61:1--61:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340329}, doi = {10.1145/3339252.3340329}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PekaricSF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PfeifferRBS19, author = {Michael Pfeiffer and Michael Rossberg and Simon Buttgereit and Guenter Schaefer}, title = {Strong Tenant Separation in Cloud Computing Platforms}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {15:1--15:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339262}, doi = {10.1145/3339252.3339262}, timestamp = {Fri, 17 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PfeifferRBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PourMFRBISE19, author = {Morteza Safaei Pour and Antonio Mangino and Kurt Friday and Matthias Rathbun and Elias Bou{-}Harb and Farkhund Iqbal and Khaled B. Shaban and Abdelkarim Erradi}, title = {Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {6:1--6:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339272}, doi = {10.1145/3339252.3339272}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PourMFRBISE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ProyHBM019, author = {Julien Proy and Karine Heydemann and Alexandre Berzati and Fabien Maj{\'{e}}ric and Albert Cohen}, title = {A First ISA-Level Characterization of {EM} Pulse Effects on Superscalar Microarchitectures: {A} Secure Software Perspective}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {7:1--7:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339253}, doi = {10.1145/3339252.3339253}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ProyHBM019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/RindellBJ19, author = {Kalle Rindell and Karin Bernsmed and Martin Gilje Jaatun}, title = {Managing Security in Software: Or: How {I} Learned to Stop Worrying and Manage the Security Technical Debt}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {60:1--60:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340338}, doi = {10.1145/3339252.3340338}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/RindellBJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SamailaJSFI19, author = {Musa G. Samaila and Moser Z. V. Jos{\'{e}} and Jo{\~{a}}o B. F. Sequeiros and M{\'{a}}rio M. Freire and Pedro R. M. In{\'{a}}cio}, title = {IoT-HarPSecA: {A} Framework for Facilitating the Design and Development of Secure IoT Devices}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {72:1--72:7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340514}, doi = {10.1145/3339252.3340514}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SamailaJSFI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SchaberreiterKR19, author = {Thomas Schaberreiter and Veronika Kupfersberger and Konstantinos Rantos and Arnolnt Spyros and Alexandros Papanikolaou and Christos Ilioudis and Gerald Quirchmayr}, title = {A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {83:1--83:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3342112}, doi = {10.1145/3339252.3342112}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SchaberreiterKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SchmidbauerWMM19, author = {Tobias Schmidbauer and Steffen Wendzel and Aleksandra Mileva and Wojciech Mazurczyk}, title = {Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {64:1--64:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341488}, doi = {10.1145/3339252.3341488}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SchmidbauerWMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SelvanathanJD19, author = {Nirojan Selvanathan and Dileepa Jayakody and Violeta Damjanovic{-}Behrendt}, title = {Federated Identity Management and Interoperability for Heterogeneous Cloud Platform Ecosystems}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {103:1--103:7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341492}, doi = {10.1145/3339252.3341492}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SelvanathanJD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SenturkYS19, author = {Serafettin Sent{\"{u}}rk and Hasan Yasar and Ibrahim Sogukpinar}, title = {Model Driven Security in a Mobile Banking Application Context}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {62:1--62:7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340529}, doi = {10.1145/3339252.3340529}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SenturkYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SmerigaJ19, author = {Juraj Smeriga and Tom{\'{a}}s Jirs{\'{\i}}k}, title = {Behavior-Aware Network Segmentation using {IP} Flows}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {5:1--5:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339265}, doi = {10.1145/3339252.3339265}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SmerigaJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SoikkeliML19, author = {Jukka Soikkeli and Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and Emil Lupu}, title = {Efficient Attack Countermeasure Selection Accounting for Recovery and Action Costs}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {3:1--3:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339270}, doi = {10.1145/3339252.3339270}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SoikkeliML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SpiekermannE019, author = {Daniel Spiekermann and Tobias Eggendorfer and J{\"{o}}rg Keller}, title = {A Study of Network Forensic Investigation in Docker Environments}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {44:1--44:7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340505}, doi = {10.1145/3339252.3340505}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SpiekermannE019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SteinebachGL19, author = {Martin Steinebach and Karol Gotkowski and Huajian Liu}, title = {Fake News Detection by Image Montage Recognition}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {55:1--55:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341487}, doi = {10.1145/3339252.3341487}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SteinebachGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SteinebachLL19, author = {Martin Steinebach and Sebastian Lutz and Huajian Liu}, title = {Privacy and Robust Hashes}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {70:1--70:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340105}, doi = {10.1145/3339252.3340105}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SteinebachLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SteinebachSKBY19, author = {Martin Steinebach and Marcel Sch{\"{a}}fer and Alexander Karakuz and Katharina Brandl and York Yannikos}, title = {Detection and Analysis of Tor Onion Services}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {66:1--66:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341486}, doi = {10.1145/3339252.3341486}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SteinebachSKBY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/StellyR19, author = {Christopher Stelly and Vassil Roussev}, title = {Language-based Integration of Digital Forensics {\&} Incident Response}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {27:1--27:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339278}, doi = {10.1145/3339252.3339278}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/StellyR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TheilBRS19, author = {Markus Theil and Martin Backhaus and Michael Rossberg and Guenter Schaefer}, title = {Towards a Security Architecture for Hybrid WMNs}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {107:1--107:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340106}, doi = {10.1145/3339252.3340106}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/TheilBRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TondelCJR19, author = {Inger Anne T{\o}ndel and Daniela Soares Cruzes and Martin Gilje Jaatun and Kalle Rindell}, title = {The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {59:1--59:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340337}, doi = {10.1145/3339252.3340337}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/TondelCJR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TundisBSM19, author = {Andrea Tundis and Leon B{\"{o}}ck and Victoria Stanilescu and Max M{\"{u}}hlh{\"{a}}user}, title = {Limits in the data for detecting criminals on social media}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {51:1--51:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341483}, doi = {10.1145/3339252.3341483}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/TundisBSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/VensonGYB19, author = {Elaine Venson and Xiaomeng Guo and Zidi Yan and Barry W. Boehm}, title = {Costing Secure Software Development: {A} Systematic Mapping Study}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {9:1--9:11}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339263}, doi = {10.1145/3339252.3339263}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/VensonGYB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/VidalM19, author = {Jorge Maestre Vidal and Marco Antonio Sotelo Monge}, title = {Adversarial Communication Networks Modeling for Intrusion Detection Strengthened against Mimicry}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {90:1--90:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340335}, doi = {10.1145/3339252.3340335}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/VidalM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/VidalM19a, author = {Jorge Maestre Vidal and Marco Antonio Sotelo Monge}, title = {Framework for Anticipatory Self-Protective 5G Environments}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {105:1--105:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341490}, doi = {10.1145/3339252.3341490}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/VidalM19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/WenK19, author = {Shao{-}Fang Wen and Basel Katt}, title = {Learning Software Security in Context: An Evaluation in Open Source Software Development Environment}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {58:1--58:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340336}, doi = {10.1145/3339252.3340336}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/WenK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Wendzel19, author = {Steffen Wendzel}, title = {Protocol-independent Detection of "Messaging Ordering" Network Covert Channels}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {63:1--63:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341477}, doi = {10.1145/3339252.3341477}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Wendzel19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Wicker19, author = {Stephen B. Wicker}, title = {eBook Readers, Location Surveillance and the Threat to Freedom of Association}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {94:1--94:7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340501}, doi = {10.1145/3339252.3340501}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Wicker19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/WilkensHKK019, author = {Florian Wilkens and Steffen Haas and Dominik Kaaser and Peter Kling and Mathias Fischer}, title = {Towards Efficient Reconstruction of Attacker Lateral Movement}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {14:1--14:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339254}, doi = {10.1145/3339252.3339254}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/WilkensHKK019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/WuBB19, author = {Tina Wu and Frank Breitinger and Ibrahim M. Baggili}, title = {IoT Ignorance is Digital Forensics Research Bliss: {A} Survey to Understand IoT Forensics Definitions, Challenges and Future Research Directions}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {46:1--46:15}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340504}, doi = {10.1145/3339252.3340504}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/WuBB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/YaminK19, author = {Muhammad Mudassar Yamin and Basel Katt}, title = {Cyber Security Skill Set Analysis for Common Curricula Development}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {37:1--37:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340527}, doi = {10.1145/3339252.3340527}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/YaminK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/YannikosHB19, author = {York Yannikos and Julian Heeger and Maria Brockmeyer}, title = {An Analysis Framework for Product Prices and Supplies in Darknet Marketplaces}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {50:1--50:7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341485}, doi = {10.1145/3339252.3341485}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/YannikosHB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ZibakS19, author = {Adam Zibak and Andrew Simpson}, title = {Cyber Threat Information Sharing: Perceived Benefits and Barriers}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {85:1--85:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340528}, doi = {10.1145/3339252.3340528}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ZibakS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/IEEEares/2019, title = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3339252}, doi = {10.1145/3339252}, isbn = {978-1-4503-7164-3}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.