Search dblp for Publications

export results for "toc:db/conf/IEEEares/ares2019.bht:"

 download as .bib file

@inproceedings{DBLP:conf/IEEEares/0003GM19,
  author       = {Lucian Popa and
                  Bogdan Groza and
                  Pal{-}Stefan Murvay},
  title        = {Performance Evaluation of Elliptic Curve Libraries on Automotive-Grade
                  Microcontrollers},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {100:1--100:7},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341480},
  doi          = {10.1145/3339252.3341480},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/0003GM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AignerZ19,
  author       = {Alexander Aigner and
                  Rene Zeller},
  title        = {{HEHLKAPPE:} Utilizing Deep Learning to Manipulate Surveillance Camera
                  Footage in Real-Time},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {56:1--56:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340102},
  doi          = {10.1145/3339252.3340102},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AignerZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AlashwaliSM19,
  author       = {Eman Salem Alashwali and
                  Pawel Szalachowski and
                  Andrew Martin},
  title        = {Does "www." Mean Better Transport Layer Security?},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {23:1--23:7},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339277},
  doi          = {10.1145/3339252.3339277},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AlashwaliSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AlnaimAF19,
  author       = {Abdulrahman Khalid Alnaim and
                  Ahmed Mahmoud Alwakeel and
                  Eduardo B. Fern{\'{a}}ndez},
  title        = {A Misuse Pattern for Compromising VMs via Virtual Machine Escape in
                  {NFV}},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {77:1--77:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340530},
  doi          = {10.1145/3339252.3340530},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AlnaimAF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AlwakeelAF19,
  author       = {Ahmed Mahmoud Alwakeel and
                  Abdulrahman Khalid Alnaim and
                  Eduardo B. Fern{\'{a}}ndez},
  title        = {A Pattern for a Virtual Network Function {(VNF)}},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {31:1--31:7},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340519},
  doi          = {10.1145/3339252.3340519},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AlwakeelAF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Amthor0KS19,
  author       = {Peter Amthor and
                  Daniel Fischer and
                  Winfried E. K{\"{u}}hnhauser and
                  Dirk Stelzer},
  title        = {Automated Cyber Threat Sensing and Responding: Integrating Threat
                  Intelligence into Security-Policy-Controlled Systems},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {86:1--86:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340509},
  doi          = {10.1145/3339252.3340509},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Amthor0KS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AndaLKBBLS19,
  author       = {Felix Anda and
                  David Lillis and
                  Aikaterini Kanta and
                  Brett A. Becker and
                  Elias Bou{-}Harb and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {Improving Borderline Adulthood Facial Age Estimation through Ensemble
                  Learning},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {57:1--57:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341491},
  doi          = {10.1145/3339252.3341491},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AndaLKBBLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AnkeleMNV19,
  author       = {Ralph Ankele and
                  Stefan Marksteiner and
                  Kai Nahrgang and
                  Heribert Vallant},
  title        = {Requirements and Recommendations for IoT/IIoT Models to automate Security
                  Assurance through Threat Modelling, Security Analysis and Penetration
                  Testing},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {102:1--102:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341482},
  doi          = {10.1145/3339252.3341482},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AnkeleMNV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AntonFS19,
  author       = {Simon D. Duque Ant{\'{o}}n and
                  Daniel Fraunholz and
                  Hans Dieter Schotten},
  title        = {Using Temporal and Topological Features for Intrusion Detection in
                  Operational Networks},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {99:1--99:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341476},
  doi          = {10.1145/3339252.3341476},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AntonFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AtamliPC19,
  author       = {Ahmad Atamli and
                  Giuseppe Petracca and
                  Jon Crowcroft},
  title        = {IO-Trust: An out-of-band trusted memory acquisition for intrusion
                  detection and Forensics investigations in cloud {IOMMU} based systems},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {45:1--45:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340511},
  doi          = {10.1145/3339252.3340511},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AtamliPC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BagAH19,
  author       = {Samiran Bag and
                  Muhammad Ajmal Azad and
                  Feng Hao},
  title        = {{E2E} Verifiable Borda Count Voting System without Tallying Authorities},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {11:1--11:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339259},
  doi          = {10.1145/3339252.3339259},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BagAH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Bartos19,
  author       = {V{\'{a}}clav Bartos},
  title        = {{NERD:} Network Entity Reputation Database},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {84:1--84:7},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340512},
  doi          = {10.1145/3339252.3340512},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Bartos19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BelairLM19,
  author       = {Maxime B{\'{e}}lair and
                  Sylvie Laniepce and
                  Jean{-}Marc Menaud},
  title        = {Leveraging Kernel Security Mechanisms to Improve Container Security:
                  a Survey},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {76:1--76:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340502},
  doi          = {10.1145/3339252.3340502},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BelairLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BerenjestanakiC19,
  author       = {Mohammad Hajian Berenjestanaki and
                  Mauro Conti and
                  Ankit Gangwal},
  title        = {On the Exploitation of Online {SMS} Receiving Services to Forge {ID}
                  Verification},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {22:1--22:5},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339276},
  doi          = {10.1145/3339252.3339276},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BerenjestanakiC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BernieriCP19,
  author       = {Giuseppe Bernieri and
                  Mauro Conti and
                  Gabriele Pozzan},
  title        = {{AMON:} an Automaton MONitor for Industrial Cyber-Physical Security},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {33:1--33:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340521},
  doi          = {10.1145/3339252.3340521},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BernieriCP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BlazyBP19,
  author       = {Olivier Blazy and
                  Laura Brouilhet and
                  Duong Hieu Phan},
  title        = {Anonymous Identity Based Encryption with Traceable Identities},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {13:1--13:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339271},
  doi          = {10.1145/3339252.3339271},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BlazyBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BlazyCV19,
  author       = {Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  Quoc{-}Huy Vu},
  title        = {Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with
                  Adaptive Corruptions},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {28:1--28:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339280},
  doi          = {10.1145/3339252.3339280},
  timestamp    = {Fri, 10 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BlazyCV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BotacinKG19,
  author       = {Marcus Botacin and
                  Anatoli Kalysch and
                  Andr{\'{e}} Gr{\'{e}}gio},
  title        = {The Internet Banking [in]Security Spiral: Past, Present, and Future
                  of Online Banking Protection Mechanisms based on a Brazilian case
                  study},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {49:1--49:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340103},
  doi          = {10.1145/3339252.3340103},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BotacinKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BuccafurriALMR19,
  author       = {Francesco Buccafurri and
                  Vincenzo De Angelis and
                  Gianluca Lax and
                  Lorenzo Musarella and
                  Antonia Russo},
  title        = {An Attribute-Based Privacy-Preserving Ethereum Solution for Service
                  Delivery with Accountability Requirements},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {24:1--24:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339279},
  doi          = {10.1145/3339252.3339279},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BuccafurriALMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BurdaBA19,
  author       = {Pavlo Burda and
                  Coen Boot and
                  Luca Allodi},
  title        = {Characterizing the Redundancy of DarkWeb .onion Services},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {19:1--19:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339273},
  doi          = {10.1145/3339252.3339273},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BurdaBA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BuschlingerSZ19,
  author       = {Lucas Buschlinger and
                  Markus Springer and
                  Maria Zhdanova},
  title        = {Plug-and-Patch: Secure Value Added Services for Electric Vehicle Charging},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {2:1--2:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339269},
  doi          = {10.1145/3339252.3339269},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BuschlingerSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CabajGMNZ19,
  author       = {Krzysztof Cabaj and
                  Marcin Gregorczyk and
                  Wojciech Mazurczyk and
                  Piotr Nowakowski and
                  Piotr Z{\'{o}}rawski},
  title        = {Sniffing Detection within the Network: Revisiting Existing and Proposing
                  Novel Approaches},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {108:1--108:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341494},
  doi          = {10.1145/3339252.3341494},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CabajGMNZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CabajMNZ19,
  author       = {Krzysztof Cabaj and
                  Wojciech Mazurczyk and
                  Piotr Nowakowski and
                  Piotr Z{\'{o}}rawski},
  title        = {Fine-tuning of Distributed Network Covert Channels Parameters and
                  Their Impact on Undetectability},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {65:1--65:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341489},
  doi          = {10.1145/3339252.3341489},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CabajMNZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CaesarS19,
  author       = {Matthias Caesar and
                  Jan Steffan},
  title        = {A Location Privacy Analysis of Bluetooth Mesh},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {97:1--97:7},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340507},
  doi          = {10.1145/3339252.3340507},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CaesarS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Calderoni19,
  author       = {Luca Calderoni},
  title        = {Preserving context security in {AWS} IoT Core},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {78:1--78:5},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340499},
  doi          = {10.1145/3339252.3340499},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Calderoni19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ChoSZ19,
  author       = {Joo Yeon Cho and
                  Andrew Sergeev and
                  Jim Zou},
  title        = {Securing Ethernet-based Optical Fronthaul for 5G Network},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {106:1--106:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341484},
  doi          = {10.1145/3339252.3341484},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ChoSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ChorasPKDKG19,
  author       = {Michal Choras and
                  Marek Pawlicki and
                  Rafal Kozik and
                  Konstantinos P. Demestichas and
                  Pavlos Kosmides and
                  Manik Gupta},
  title        = {SocialTruth Project Approach to Online Disinformation (Fake News)
                  Detection and Mitigation},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {68:1--68:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341497},
  doi          = {10.1145/3339252.3341497},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ChorasPKDKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CledelCC19,
  author       = {Thomas Cl{\'{e}}del and
                  Nora Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Managing the Overestimation of Resilience},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {35:1--35:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340333},
  doi          = {10.1145/3339252.3340333},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CledelCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ContiGT19,
  author       = {Mauro Conti and
                  Ankit Gangwal and
                  Michele Todero},
  title        = {Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {16:1--16:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339255},
  doi          = {10.1145/3339252.3339255},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ContiGT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CurtinGGKM19,
  author       = {Ryan R. Curtin and
                  Andrew B. Gardner and
                  Slawomir Grzonkowski and
                  Alexey Kleymenov and
                  Alejandro Mosquera},
  title        = {Detecting {DGA} domains with recurrent neural networks and side information},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {20:1--20:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339258},
  doi          = {10.1145/3339252.3339258},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CurtinGGKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DamKBS19,
  author       = {Tobias Dam and
                  Lukas Daniel Klausner and
                  Damjan Buhov and
                  Sebastian Schrittwieser},
  title        = {Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {53:1--53:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340332},
  doi          = {10.1145/3339252.3340332},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DamKBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DamT19,
  author       = {Khanh{-}Huu{-}The Dam and
                  Tayssir Touili},
  title        = {{STAMAD:} a STAtic MAlware Detector},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {25:1--25:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339274},
  doi          = {10.1145/3339252.3339274},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DamT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DernaikaCCR19,
  author       = {Farah Dernaika and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Olivier Raynaud},
  title        = {Semantic Mediation for {A} Posteriori Log Analysis},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {88:1--88:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340104},
  doi          = {10.1145/3339252.3340104},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DernaikaCCR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DollSO019,
  author       = {Christian Doll and
                  Arnold Sykosch and
                  Marc Ohm and
                  Michael Meier},
  title        = {Automated Pattern Inference Based on Repeatedly Observed Malware Artifacts},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {82:1--82:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340510},
  doi          = {10.1145/3339252.3340510},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DollSO019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DominguesR19,
  author       = {Patr{\'{\i}}cio Domingues and
                  Alexandre Fraz{\~{a}}o Ros{\'{a}}rio},
  title        = {Deep Learning-based Facial Detection and Recognition in Still Images
                  for Digital Forensics},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {40:1--40:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340107},
  doi          = {10.1145/3339252.3340107},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DominguesR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DoynikovaFK19,
  author       = {Elena Doynikova and
                  Andrey Fedorchenko and
                  Igor V. Kotenko},
  title        = {Ontology of Metrics for Cyber Security Assessment},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {52:1--52:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341496},
  doi          = {10.1145/3339252.3341496},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DoynikovaFK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DuS19,
  author       = {Xiaoyu Du and
                  Mark Scanlon},
  title        = {Methodology for the Automated Metadata-Based Classification of Incriminating
                  Digital Forensic Artefacts},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {43:1--43:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340517},
  doi          = {10.1145/3339252.3340517},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DuS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/EnglbrechtLPQ19,
  author       = {Ludwig Englbrecht and
                  Gregor Langner and
                  G{\"{u}}nther Pernul and
                  Gerald Quirchmayr},
  title        = {Enhancing credibility of digital evidence through provenance-based
                  incident response handling},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {26:1--26:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339275},
  doi          = {10.1145/3339252.3339275},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/EnglbrechtLPQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Es-SalhiEC19,
  author       = {Khaoula Es{-}Salhi and
                  David Espes and
                  Nora Cuppens},
  title        = {{DTE} Access Control Model for Integrated {ICS} Systems},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {79:1--79:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340498},
  doi          = {10.1145/3339252.3340498},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Es-SalhiEC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FeichtnerR19,
  author       = {Johannes Feichtner and
                  Christof Rabensteiner},
  title        = {Obfuscation-Resilient Code Recognition in Android Apps},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {8:1--8:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339260},
  doi          = {10.1145/3339252.3339260},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FeichtnerR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FujsMV19,
  author       = {Damjan Fujs and
                  Anze Mihelic and
                  Simon L. R. Vrhovec},
  title        = {The power of interpretation: Qualitative methods in cybersecurity
                  research},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {92:1--92:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341479},
  doi          = {10.1145/3339252.3341479},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FujsMV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GhaeiniTZ19,
  author       = {Hamid Reza Ghaeini and
                  Nils Ole Tippenhauer and
                  Jianying Zhou},
  title        = {Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {80:1--80:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340331},
  doi          = {10.1145/3339252.3340331},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GhaeiniTZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GiannetsosK19,
  author       = {Thanassis Giannetsos and
                  Ioannis Krontiris},
  title        = {Securing {V2X} Communications for the Future: Can {PKI} Systems offer
                  the answer?},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {95:1--95:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340523},
  doi          = {10.1145/3339252.3340523},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GiannetsosK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GobelTB19,
  author       = {Thomas G{\"{o}}bel and
                  Jan T{\"{u}}rr and
                  Harald Baier},
  title        = {Revisiting Data Hiding Techniques for Apple File System},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {41:1--41:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340524},
  doi          = {10.1145/3339252.3340524},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GobelTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GrossAM19,
  author       = {Tobias Gro{\ss} and
                  Matanat Ahmadova and
                  Tilo M{\"{u}}ller},
  title        = {Analyzing Android's File-Based Encryption: Information Leakage through
                  Unencrypted Metadata},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {47:1--47:7},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340340},
  doi          = {10.1145/3339252.3340340},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GrossAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Halvani0G19,
  author       = {Oren Halvani and
                  Christian Winter and
                  Lukas Graner},
  title        = {Assessing the Applicability of Authorship Verification Methods},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {38:1--38:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340508},
  doi          = {10.1145/3339252.3340508},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Halvani0G19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HammH019,
  author       = {Peter Hamm and
                  David Harborth and
                  Sebastian Pape},
  title        = {A Systematic Analysis of User Evaluations in Security Research},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {91:1--91:7},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340339},
  doi          = {10.1145/3339252.3340339},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HammH019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HassenfeldtBBZ19,
  author       = {Courtney Hassenfeldt and
                  Shabana Baig and
                  Ibrahim M. Baggili and
                  Xiaolu Zhang},
  title        = {Map My Murder: {A} Digital Forensic Study of Mobile Health and Fitness
                  Applications},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {42:1--42:12},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340515},
  doi          = {10.1145/3339252.3340515},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HassenfeldtBBZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HittmeirEM19,
  author       = {Markus Hittmeir and
                  Andreas Ekelhart and
                  Rudolf Mayer},
  title        = {On the Utility of Synthetic Data: An Empirical Evaluation on Machine
                  Learning Tasks},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {29:1--29:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339281},
  doi          = {10.1145/3339252.3339281},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HittmeirEM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HorakSH19,
  author       = {Martin Hor{\'{a}}k and
                  V{\'{a}}clav Stupka and
                  Martin Hus{\'{a}}k},
  title        = {{GDPR} Compliance in Cybersecurity Software: {A} Case Study of {DPIA}
                  in Information Sharing Platform},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {36:1--36:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340516},
  doi          = {10.1145/3339252.3340516},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HorakSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HusakK19,
  author       = {Martin Hus{\'{a}}k and
                  Jaroslav Kaspar},
  title        = {{AIDA} Framework: Real-Time Correlation and Prediction of Intrusion
                  Detection Alerts},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {81:1--81:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340513},
  doi          = {10.1145/3339252.3340513},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HusakK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/IliouKTKVK19,
  author       = {Christos Iliou and
                  Theodoros Kostoulas and
                  Theodora Tsikrika and
                  Vasilis Katos and
                  Stefanos Vrochidis and
                  Yiannis Kompatsiaris},
  title        = {Towards a framework for detecting advanced Web bots},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {18:1--18:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339267},
  doi          = {10.1145/3339252.3339267},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/IliouKTKVK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/IqbalKS19,
  author       = {Junaid Iqbal and
                  Ratinder Kaur and
                  Natalia Stakhanova},
  title        = {PoliDOM: Mitigation of {DOM-XSS} by Detection and Prevention of Unauthorized
                  {DOM} Tampering},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {17:1--17:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339257},
  doi          = {10.1145/3339252.3339257},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/IqbalKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/JavedSJ19,
  author       = {Yousra Javed and
                  Shashank Sethi and
                  Akshay Jadoun},
  title        = {Alexa's Voice Recording Behavior: {A} Survey of User Understanding
                  and Awareness},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {89:1--89:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340330},
  doi          = {10.1145/3339252.3340330},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/JavedSJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/JavornikKH19,
  author       = {Michal Javorn{\'{\i}}k and
                  Jana Kom{\'{a}}rkov{\'{a}} and
                  Martin Hus{\'{a}}k},
  title        = {Decision Support for Mission-Centric Cyber Defence},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {34:1--34:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340522},
  doi          = {10.1145/3339252.3340522},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/JavornikKH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Kantola19,
  author       = {Raimo Kantola},
  title        = {6G Network Needs to Support Embedded Trust},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {104:1--104:5},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341498},
  doi          = {10.1145/3339252.3341498},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Kantola19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KarakocNE19,
  author       = {Ferhat Karako{\c{c}} and
                  Majid Nateghizad and
                  Zekeriya Erkin},
  title        = {{SET-OT:} {A} Secure Equality Testing Protocol Based on Oblivious
                  Transfer},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {12:1--12:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339264},
  doi          = {10.1145/3339252.3339264},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KarakocNE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KrennSS19,
  author       = {Stephan Krenn and
                  Kai Samelin and
                  Christoph Striecks},
  title        = {Practical Group-Signatures with Privacy-Friendly Openings},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {10:1--10:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339256},
  doi          = {10.1145/3339252.3339256},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KrennSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KuppaGAL19,
  author       = {Aditya Kuppa and
                  Slawomir Grzonkowski and
                  Muhammad Rizwan Asghar and
                  Nhien{-}An Le{-}Khac},
  title        = {Black Box Attacks on Deep Anomaly Detectors},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {21:1--21:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339266},
  doi          = {10.1145/3339252.3339266},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KuppaGAL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LeanderCH19,
  author       = {Bj{\"{o}}rn Leander and
                  Aida Causevic and
                  Hans Hansson},
  title        = {Applicability of the {IEC} 62443 standard in Industry 4.0 / IIoT},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {101:1--101:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341481},
  doi          = {10.1145/3339252.3341481},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LeanderCH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LiWSL19,
  author       = {Zhuohua Li and
                  Jincheng Wang and
                  Mingshen Sun and
                  John C. S. Lui},
  title        = {Securing the Device Drivers of Your Embedded Systems: Framework and
                  Prototype},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {71:1--71:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340506},
  doi          = {10.1145/3339252.3340506},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LiWSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LiuSS19,
  author       = {Huajian Liu and
                  Martin Steinebach and
                  Kathrin Sch{\"{o}}lei},
  title        = {Improved Manipulation Detection with Convolutional Neural Network
                  for {JPEG} Images},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {39:1--39:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340526},
  doi          = {10.1145/3339252.3340526},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LiuSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LunaAC19,
  author       = {Donatello Luna and
                  Luca Allodi and
                  Marco Cremonini},
  title        = {Productivity and Patterns of Activity in Bug Bounty Programs: Analysis
                  of HackerOne and Google Vulnerability Research},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {67:1--67:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341495},
  doi          = {10.1145/3339252.3341495},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LunaAC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MadaniV19,
  author       = {Pooria Madani and
                  Natalija Vlajic},
  title        = {Near-optimal Evasion of Randomized Convex-inducing Classifiers in
                  Adversarial Environments},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {32:1--32:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340520},
  doi          = {10.1145/3339252.3340520},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MadaniV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MahainiLS19,
  author       = {Mohamad Imad Mahaini and
                  Shujun Li and
                  Rahime Belen Saglam},
  title        = {Building Taxonomies based on Human-Machine Teaming: Cyber Security
                  as an Example},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {30:1--30:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339282},
  doi          = {10.1145/3339252.3339282},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MahainiLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MainaliS19,
  author       = {Pradip Mainali and
                  Carlton Shepherd},
  title        = {Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party
                  Computation},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {73:1--73:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340500},
  doi          = {10.1145/3339252.3340500},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MainaliS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MainaliSP19,
  author       = {Pradip Mainali and
                  Carlton Shepherd and
                  Fabien A. P. Petitcolas},
  title        = {Privacy-Enhancing Context Authentication from Location-Sensitive Data},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {87:1--87:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340334},
  doi          = {10.1145/3339252.3340334},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MainaliSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MalinaSDHF19,
  author       = {Lukas Malina and
                  Gautam Srivastava and
                  Petr Dzurenda and
                  Jan Hajny and
                  Radek Fujdiak},
  title        = {A Secure Publish/Subscribe Protocol for Internet of Things},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {75:1--75:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340503},
  doi          = {10.1145/3339252.3340503},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MalinaSDHF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MartinoQL19,
  author       = {Mariano Di Martino and
                  Peter Quax and
                  Wim Lamotte},
  title        = {Realistically Fingerprinting Social Media Webpages in {HTTPS} Traffic},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {54:1--54:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341478},
  doi          = {10.1145/3339252.3341478},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MartinoQL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MarzouguiK19,
  author       = {Soundes Marzougui and
                  Juliane Kr{\"{a}}mer},
  title        = {Post-Quantum Cryptography in Embedded Systems},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {48:1--48:7},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341475},
  doi          = {10.1145/3339252.3341475},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MarzouguiK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MazurczykSWC19,
  author       = {Wojciech Mazurczyk and
                  Przemyslaw Szary and
                  Steffen Wendzel and
                  Luca Caviglione},
  title        = {Towards Reversible Storage Network Covert Channels},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {69:1--69:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341493},
  doi          = {10.1145/3339252.3341493},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MazurczykSWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MikhaylovFPVMM19,
  author       = {Konstantin Mikhaylov and
                  Radek Fujdiak and
                  Ari Pouttu and
                  Miroslav Vozn{\'{a}}k and
                  Lukas Malina and
                  Petr Mlynek},
  title        = {Energy Attack in LoRaWAN: Experimental Validation},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {74:1--74:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340525},
  doi          = {10.1145/3339252.3340525},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MikhaylovFPVMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Moeckel19,
  author       = {Caroline Moeckel},
  title        = {Examining and Constructing Attacker Categorisations: an Experimental
                  Typology for Digital Banking},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {93:1--93:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340341},
  doi          = {10.1145/3339252.3340341},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Moeckel19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MuellerZN19,
  author       = {Tobias Mueller and
                  Ephraim Zimmer and
                  Ludovico de Nittis},
  title        = {Using Context and Provenance to defend against USB-borne attacks},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {1:1--1:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339268},
  doi          = {10.1145/3339252.3339268},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MuellerZN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MuschWJR19,
  author       = {Marius Musch and
                  Christian Wressnegger and
                  Martin Johns and
                  Konrad Rieck},
  title        = {Thieves in the Browser: Web-based Cryptojacking in the Wild},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {4:1--4:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339261},
  doi          = {10.1145/3339252.3339261},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MuschWJR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/NguyenAMLW19,
  author       = {Khuong An Nguyen and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Zhiyuan Luo and
                  Chris Watkins},
  title        = {Location Tracking Using Smartphone Accelerometer and Magnetometer
                  Traces},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {96:1--96:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340518},
  doi          = {10.1145/3339252.3340518},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/NguyenAMLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ParkerYACJT19,
  author       = {Luke R. Parker and
                  Paul D. Yoo and
                  A. Taufiq Asyhari and
                  Lounis Chermak and
                  Yoonchan Jhi and
                  Kamal Taha},
  title        = {DEMISe: Interpretable Deep Extraction and Mutual Information Selection
                  Techniques for IoT Intrusion Detection},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {98:1--98:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340497},
  doi          = {10.1145/3339252.3340497},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ParkerYACJT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PekaricSF19,
  author       = {Irdin Pekaric and
                  Clemens Sauerwein and
                  Michael Felderer},
  title        = {Applying Security Testing Techniques to Automotive Engineering},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {61:1--61:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340329},
  doi          = {10.1145/3339252.3340329},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PekaricSF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PfeifferRBS19,
  author       = {Michael Pfeiffer and
                  Michael Rossberg and
                  Simon Buttgereit and
                  Guenter Schaefer},
  title        = {Strong Tenant Separation in Cloud Computing Platforms},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {15:1--15:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339262},
  doi          = {10.1145/3339252.3339262},
  timestamp    = {Fri, 17 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PfeifferRBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PourMFRBISE19,
  author       = {Morteza Safaei Pour and
                  Antonio Mangino and
                  Kurt Friday and
                  Matthias Rathbun and
                  Elias Bou{-}Harb and
                  Farkhund Iqbal and
                  Khaled B. Shaban and
                  Abdelkarim Erradi},
  title        = {Data-driven Curation, Learning and Analysis for Inferring Evolving
                  IoT Botnets in the Wild},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {6:1--6:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339272},
  doi          = {10.1145/3339252.3339272},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PourMFRBISE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ProyHBM019,
  author       = {Julien Proy and
                  Karine Heydemann and
                  Alexandre Berzati and
                  Fabien Maj{\'{e}}ric and
                  Albert Cohen},
  title        = {A First ISA-Level Characterization of {EM} Pulse Effects on Superscalar
                  Microarchitectures: {A} Secure Software Perspective},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {7:1--7:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339253},
  doi          = {10.1145/3339252.3339253},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ProyHBM019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/RindellBJ19,
  author       = {Kalle Rindell and
                  Karin Bernsmed and
                  Martin Gilje Jaatun},
  title        = {Managing Security in Software: Or: How {I} Learned to Stop Worrying
                  and Manage the Security Technical Debt},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {60:1--60:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340338},
  doi          = {10.1145/3339252.3340338},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/RindellBJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SamailaJSFI19,
  author       = {Musa G. Samaila and
                  Moser Z. V. Jos{\'{e}} and
                  Jo{\~{a}}o B. F. Sequeiros and
                  M{\'{a}}rio M. Freire and
                  Pedro R. M. In{\'{a}}cio},
  title        = {IoT-HarPSecA: {A} Framework for Facilitating the Design and Development
                  of Secure IoT Devices},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {72:1--72:7},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340514},
  doi          = {10.1145/3339252.3340514},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SamailaJSFI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SchaberreiterKR19,
  author       = {Thomas Schaberreiter and
                  Veronika Kupfersberger and
                  Konstantinos Rantos and
                  Arnolnt Spyros and
                  Alexandros Papanikolaou and
                  Christos Ilioudis and
                  Gerald Quirchmayr},
  title        = {A Quantitative Evaluation of Trust in the Quality of Cyber Threat
                  Intelligence Sources},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {83:1--83:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3342112},
  doi          = {10.1145/3339252.3342112},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SchaberreiterKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SchmidbauerWMM19,
  author       = {Tobias Schmidbauer and
                  Steffen Wendzel and
                  Aleksandra Mileva and
                  Wojciech Mazurczyk},
  title        = {Introducing Dead Drops to Network Steganography using ARP-Caches and
                  SNMP-Walks},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {64:1--64:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341488},
  doi          = {10.1145/3339252.3341488},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SchmidbauerWMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SelvanathanJD19,
  author       = {Nirojan Selvanathan and
                  Dileepa Jayakody and
                  Violeta Damjanovic{-}Behrendt},
  title        = {Federated Identity Management and Interoperability for Heterogeneous
                  Cloud Platform Ecosystems},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {103:1--103:7},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341492},
  doi          = {10.1145/3339252.3341492},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SelvanathanJD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SenturkYS19,
  author       = {Serafettin Sent{\"{u}}rk and
                  Hasan Yasar and
                  Ibrahim Sogukpinar},
  title        = {Model Driven Security in a Mobile Banking Application Context},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {62:1--62:7},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340529},
  doi          = {10.1145/3339252.3340529},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SenturkYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SmerigaJ19,
  author       = {Juraj Smeriga and
                  Tom{\'{a}}s Jirs{\'{\i}}k},
  title        = {Behavior-Aware Network Segmentation using {IP} Flows},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {5:1--5:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339265},
  doi          = {10.1145/3339252.3339265},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SmerigaJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SoikkeliML19,
  author       = {Jukka Soikkeli and
                  Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and
                  Emil Lupu},
  title        = {Efficient Attack Countermeasure Selection Accounting for Recovery
                  and Action Costs},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {3:1--3:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339270},
  doi          = {10.1145/3339252.3339270},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SoikkeliML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SpiekermannE019,
  author       = {Daniel Spiekermann and
                  Tobias Eggendorfer and
                  J{\"{o}}rg Keller},
  title        = {A Study of Network Forensic Investigation in Docker Environments},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {44:1--44:7},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340505},
  doi          = {10.1145/3339252.3340505},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SpiekermannE019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SteinebachGL19,
  author       = {Martin Steinebach and
                  Karol Gotkowski and
                  Huajian Liu},
  title        = {Fake News Detection by Image Montage Recognition},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {55:1--55:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341487},
  doi          = {10.1145/3339252.3341487},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SteinebachGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SteinebachLL19,
  author       = {Martin Steinebach and
                  Sebastian Lutz and
                  Huajian Liu},
  title        = {Privacy and Robust Hashes},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {70:1--70:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340105},
  doi          = {10.1145/3339252.3340105},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SteinebachLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SteinebachSKBY19,
  author       = {Martin Steinebach and
                  Marcel Sch{\"{a}}fer and
                  Alexander Karakuz and
                  Katharina Brandl and
                  York Yannikos},
  title        = {Detection and Analysis of Tor Onion Services},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {66:1--66:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341486},
  doi          = {10.1145/3339252.3341486},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SteinebachSKBY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/StellyR19,
  author       = {Christopher Stelly and
                  Vassil Roussev},
  title        = {Language-based Integration of Digital Forensics {\&} Incident
                  Response},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {27:1--27:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339278},
  doi          = {10.1145/3339252.3339278},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/StellyR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TheilBRS19,
  author       = {Markus Theil and
                  Martin Backhaus and
                  Michael Rossberg and
                  Guenter Schaefer},
  title        = {Towards a Security Architecture for Hybrid WMNs},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {107:1--107:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340106},
  doi          = {10.1145/3339252.3340106},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TheilBRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TondelCJR19,
  author       = {Inger Anne T{\o}ndel and
                  Daniela Soares Cruzes and
                  Martin Gilje Jaatun and
                  Kalle Rindell},
  title        = {The Security Intention Meeting Series as a way to increase visibility
                  of software security decisions in agile development projects},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {59:1--59:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340337},
  doi          = {10.1145/3339252.3340337},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TondelCJR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TundisBSM19,
  author       = {Andrea Tundis and
                  Leon B{\"{o}}ck and
                  Victoria Stanilescu and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Limits in the data for detecting criminals on social media},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {51:1--51:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341483},
  doi          = {10.1145/3339252.3341483},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TundisBSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/VensonGYB19,
  author       = {Elaine Venson and
                  Xiaomeng Guo and
                  Zidi Yan and
                  Barry W. Boehm},
  title        = {Costing Secure Software Development: {A} Systematic Mapping Study},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {9:1--9:11},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339263},
  doi          = {10.1145/3339252.3339263},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/VensonGYB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/VidalM19,
  author       = {Jorge Maestre Vidal and
                  Marco Antonio Sotelo Monge},
  title        = {Adversarial Communication Networks Modeling for Intrusion Detection
                  Strengthened against Mimicry},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {90:1--90:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340335},
  doi          = {10.1145/3339252.3340335},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/VidalM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/VidalM19a,
  author       = {Jorge Maestre Vidal and
                  Marco Antonio Sotelo Monge},
  title        = {Framework for Anticipatory Self-Protective 5G Environments},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {105:1--105:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341490},
  doi          = {10.1145/3339252.3341490},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/VidalM19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/WenK19,
  author       = {Shao{-}Fang Wen and
                  Basel Katt},
  title        = {Learning Software Security in Context: An Evaluation in Open Source
                  Software Development Environment},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {58:1--58:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340336},
  doi          = {10.1145/3339252.3340336},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/WenK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Wendzel19,
  author       = {Steffen Wendzel},
  title        = {Protocol-independent Detection of "Messaging Ordering" Network Covert
                  Channels},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {63:1--63:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341477},
  doi          = {10.1145/3339252.3341477},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Wendzel19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Wicker19,
  author       = {Stephen B. Wicker},
  title        = {eBook Readers, Location Surveillance and the Threat to Freedom of
                  Association},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {94:1--94:7},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340501},
  doi          = {10.1145/3339252.3340501},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Wicker19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/WilkensHKK019,
  author       = {Florian Wilkens and
                  Steffen Haas and
                  Dominik Kaaser and
                  Peter Kling and
                  Mathias Fischer},
  title        = {Towards Efficient Reconstruction of Attacker Lateral Movement},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {14:1--14:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339254},
  doi          = {10.1145/3339252.3339254},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/WilkensHKK019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/WuBB19,
  author       = {Tina Wu and
                  Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {IoT Ignorance is Digital Forensics Research Bliss: {A} Survey to Understand
                  IoT Forensics Definitions, Challenges and Future Research Directions},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {46:1--46:15},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340504},
  doi          = {10.1145/3339252.3340504},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/WuBB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/YaminK19,
  author       = {Muhammad Mudassar Yamin and
                  Basel Katt},
  title        = {Cyber Security Skill Set Analysis for Common Curricula Development},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {37:1--37:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340527},
  doi          = {10.1145/3339252.3340527},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/YaminK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/YannikosHB19,
  author       = {York Yannikos and
                  Julian Heeger and
                  Maria Brockmeyer},
  title        = {An Analysis Framework for Product Prices and Supplies in Darknet Marketplaces},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {50:1--50:7},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341485},
  doi          = {10.1145/3339252.3341485},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/YannikosHB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ZibakS19,
  author       = {Adam Zibak and
                  Andrew Simpson},
  title        = {Cyber Threat Information Sharing: Perceived Benefits and Barriers},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {85:1--85:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340528},
  doi          = {10.1145/3339252.3340528},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ZibakS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2019,
  title        = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3339252},
  doi          = {10.1145/3339252},
  isbn         = {978-1-4503-7164-3},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics