Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/IEEEias/IEEEias2008.bht:"
@inproceedings{DBLP:conf/IEEEias/AbbassiF08, author = {Ryma Abassi and Sihem Guemara El Fatmi}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {An Automated Validation Method for Security Policies: The Firewall Case}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {291--294}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.52}, doi = {10.1109/IAS.2008.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AbbassiF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AbdallahT08, author = {Ali E. Abdallah and Hassan Takabi}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Integrating Delegation with the Formal Core {RBAC} Model}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {33--36}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.66}, doi = {10.1109/IAS.2008.66}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AbdallahT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AbdelnurARS08, author = {Humberto J. Abdelnur and Tigran Avanesov and Micha{\"{e}}l Rusinowitch and Radu State}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Abusing {SIP} Authentication}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {237--242}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.29}, doi = {10.1109/IAS.2008.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AbdelnurARS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/Abdullah-Al-WadudC08, author = {Mohammad Abdullah{-}Al{-}Wadud and Oksam Chae}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Skin Segmentation Using Color Distance Map and Water-Flow Property}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {83--88}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.65}, doi = {10.1109/IAS.2008.65}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/Abdullah-Al-WadudC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AbidA08, author = {Mohamed Abid and Hossam Afifi}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement Protocol}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {99--102}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.22}, doi = {10.1109/IAS.2008.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AbidA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AlbanoCP08, author = {Michele Albano and Stefano Chessa and Roberto Di Pietro}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Information Assurance in Critical Infrastructures via Wireless Sensor Networks}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {305--310}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.54}, doi = {10.1109/IAS.2008.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AlbanoCP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AlkubeilyBB08, author = {Mothanna Alkubeily and Hatem Bettahar and Abdelmadjid Bouabdallah}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {141--146}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.43}, doi = {10.1109/IAS.2008.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AlkubeilyBB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AndreouM08, author = {Marios S. Andreou and Aad P. A. van Moorsel}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {COTraSE: Connection Oriented Traceback in Switched Ethernet}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {198--204}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.25}, doi = {10.1109/IAS.2008.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AndreouM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AraragiP08, author = {Tadashi Araragi and Olivier Pereira}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Automatic Verification of Simulatability in Security Protocols}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {275--280}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.50}, doi = {10.1109/IAS.2008.50}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AraragiP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/BellaCR08, author = {Giampaolo Bella and Gianpiero Costantino and Salvatore Riccobene}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Managing Reputation over MANETs}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {255--260}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.24}, doi = {10.1109/IAS.2008.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/BellaCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/BellaLR08, author = {Giampaolo Bella and Francesco Librizzi and Salvatore Riccobene}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Realistic Threats to Self-Enforcing Privacy}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {155--160}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.23}, doi = {10.1109/IAS.2008.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/BellaLR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/CaoL08, author = {Zhengjun Cao and Lihua Liu}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {A Group Key Agreement Scheme Revisited}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {95--98}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.13}, doi = {10.1109/IAS.2008.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/CaoL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ChalkiasBHS08, author = {Konstantinos Chalkias and Foteini Baldimtsi and Dimitrios Hristu{-}Varsakelis and George Stephanides}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {An Implementation Infrastructure for Server-Passive Timed-Release Cryptography}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {89--94}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.49}, doi = {10.1109/IAS.2008.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ChalkiasBHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ChenWS08, author = {Feng Chen and Lingyu Wang and Jinshu Su}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {209--212}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.38}, doi = {10.1109/IAS.2008.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ChenWS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/DusiGS08, author = {Maurizio Dusi and Francesco Gringoli and Luca Salgarelli}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {A Model for the Study of Privacy Issues in Secure Shell Connections}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {311--317}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.46}, doi = {10.1109/IAS.2008.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/DusiGS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/El-FotouhD08, author = {Mohamed Abo El{-}Fotouh and Klaus Diepold}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Dynamic Substitution Model}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {108--111}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.20}, doi = {10.1109/IAS.2008.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/El-FotouhD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/El-FotouhD08a, author = {Mohamed Abo El{-}Fotouh and Klaus Diepold}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {A New Narrow Block Mode of Operations for Disk Encryption}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {126--131}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.19}, doi = {10.1109/IAS.2008.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/El-FotouhD08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ElshakankiryCZ08, author = {Osama A. Elshakankiry and Andy Carpenter and Ning Zhang}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {A New Secure Binding Management Protocol for Mobile IPv6 Networks}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {281--286}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.41}, doi = {10.1109/IAS.2008.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ElshakankiryCZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/EskelandO08, author = {Sigurd Eskeland and Vladimir A. Oleshchuk}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Efficient Hierarchical Group-Oriented Key Establishment and Decryption}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {67--72}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.51}, doi = {10.1109/IAS.2008.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/EskelandO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/FrattolilloL08, author = {Franco Frattolillo and Federica Landolfi}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Designing a {DRM} System}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {221--226}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.9}, doi = {10.1109/IAS.2008.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/FrattolilloL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/GadangPH08, author = {Siddharta S. Gadang and Brajendra Panda and Joseph E. Hoag}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Provenance Tracking with Bit Vectors}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {132--137}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.47}, doi = {10.1109/IAS.2008.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/GadangPH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HabibJM08, author = {Lionel Habib and Mathieu Jaume and Charles Morisset}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {A Formal Comparison of the Bell {\&} LaPadula and {RBAC} Models}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {3--8}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.18}, doi = {10.1109/IAS.2008.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/HabibJM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HaidarA08, author = {Ali Nasrat Haidar and Ali E. Abdallah}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {21--26}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.67}, doi = {10.1109/IAS.2008.67}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/HaidarA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HassanKZ08, author = {Doaa Hassan and Sherif El{-}Kassas and Ibrahim Ziedan}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Developing a Security Typed Java Servlet}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {215--220}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.31}, doi = {10.1109/IAS.2008.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/HassanKZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HassanKZ08a, author = {Doaa Hassan and Sherif El{-}Kassas and Ibrahim Ziedan}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Challenges for Security Typed Web Scripting Languages Design}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {227--230}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.33}, doi = {10.1109/IAS.2008.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/HassanKZ08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HoppeKD08, author = {Tobias Hoppe and Stefan Kiltz and Jana Dittmann}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Adaptive Dynamic Reaction to Automotive {IT} Security Incidents Using Multimedia Car Environment}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {295--298}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.45}, doi = {10.1109/IAS.2008.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/HoppeKD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HuangC08, author = {Dazu Huang and Zhigang Chen}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Quantum Key Distribution Based on Multi-qubit Hadamard Matrices}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {333--337}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.40}, doi = {10.1109/IAS.2008.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/HuangC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ImpedovoR08, author = {Donato Impedovo and Mario Refice}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Speaker Identification by Multi-Frame Generative Models}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {27--32}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.15}, doi = {10.1109/IAS.2008.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ImpedovoR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/JeoungSHKKL08, author = {Ji{-}Hee Jeoung and Eun{-}Ji Shin and Seng{-}Phil Hong and Sung{-}Hoon Kim and In{-}Ho Kim and Min{-}Woo Lee}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Systematic Website Verification for Privacy Protection}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {231--234}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.48}, doi = {10.1109/IAS.2008.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/JeoungSHKKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/JinVK08, author = {Di Jin and Pramode K. Verma and Stamatios V. Kartalopoulos}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Key Distribution Using Dual Quantum Channels}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {327--332}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.34}, doi = {10.1109/IAS.2008.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/JinVK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/KammasKS08, author = {Pantelis Kammas and Thodoros Komninos and Yannis C. Stamatiou}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {A Queuing Theory Based Model for Studying Intrusion Evolution and Elimination in Computer Networks}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {167--171}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.60}, doi = {10.1109/IAS.2008.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/KammasKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/Kartalopoulos08, author = {Stamatios V. Kartalopoulos}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Chaotic Quantum Cryptography}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {338--342}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.32}, doi = {10.1109/IAS.2008.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/Kartalopoulos08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/KhanB08, author = {Liaqat Ali Khan and Muhammad Shamim Baig}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {A Server Based {ASR} Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {103--107}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.14}, doi = {10.1109/IAS.2008.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/KhanB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/Kondakci08, author = {Suleyman Kondakci}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {A Composite Network Security Assessment}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {249--254}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.59}, doi = {10.1109/IAS.2008.59}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/Kondakci08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/LarsonLNJ08, author = {Ulf Larson and Stefan Lindskog and Dennis K. Nilsson and Erland Jonsson}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Operator-Centric and Adaptive Intrusion Detection}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {161--166}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.42}, doi = {10.1109/IAS.2008.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/LarsonLNJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/LeungM08, author = {Adrian Leung and Chris J. Mitchell}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {A Device Management Framework for Secure Ubiquitous Service Delivery}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {267--274}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.28}, doi = {10.1109/IAS.2008.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/LeungM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/LimLLL08, author = {Shu Yun Lim and Meng{-}Hui Lim and Sanggon Lee and Hoonjae Lee}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {43--49}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.16}, doi = {10.1109/IAS.2008.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/LimLLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/LuoYP08, author = {Hao Luo and Fa{-}Xin Yu and Jeng{-}Shyang Pan}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Data Hiding in Non-Expansion Visual Cryptography Based on Edge Enhancement Multitoning}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {79--82}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.57}, doi = {10.1109/IAS.2008.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/LuoYP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/Mazzariello08, author = {Claudio Mazzariello}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {{IRC} Traffic Analysis for Botnet Detection}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {318--323}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.58}, doi = {10.1109/IAS.2008.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/Mazzariello08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MondalS08, author = {Samrat Mondal and Shamik Sural}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Security Analysis of Temporal-RBAC Using Timed Automata}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {37--40}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.10}, doi = {10.1109/IAS.2008.10}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MondalS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/NandaLC08, author = {Susanta Nanda and Lap{-}Chung Lam and Tzi{-}cker Chiueh}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Web Application Attack Prevention for Tiered Internet Services}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {186--191}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.62}, doi = {10.1109/IAS.2008.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/NandaLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/PandeyGLZ08, author = {Navneet Kumar Pandey and S. K. Gupta and Shaveta Leekha and Jingmin Zhou}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {{ACML:} Capability Based Attack Modeling Language}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {147--154}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.26}, doi = {10.1109/IAS.2008.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/PandeyGLZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/PetrovicB08, author = {Slobodan Petrovic and Sverre Bakke}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Improving the Efficiency of Misuse Detection by Means of the q-gram Distance}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {205--208}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.39}, doi = {10.1109/IAS.2008.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/PetrovicB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/RazakSM08, author = {Shukor Abd Razak and Normalia Samian and Mohd Aizaini Maarof}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {A Friend Mechanism for Mobile Ad Hoc Networks}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {243--248}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.27}, doi = {10.1109/IAS.2008.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/RazakSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/RodwaldS08, author = {Przemyslaw Rodwald and Janusz Stoklosa}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {{PHAL-256} - Parameterized Hash Algorithm}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {50--55}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.56}, doi = {10.1109/IAS.2008.56}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/RodwaldS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/RohaniMSK08, author = {Mohd. Foad Rohani and Mohd Aizaini Maarof and Ali Selamat and Houssain Kettani}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {LoSS Detection Approach Based on {ESOSS} and {ASOSS} Models}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {192--197}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.37}, doi = {10.1109/IAS.2008.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/RohaniMSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SaradSV08, author = {A. V. Sarad and Sankar Kuppan and M. Vipin}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {A Time and Storage Efficient Solution to Remote File Integrity Check}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {120--125}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.30}, doi = {10.1109/IAS.2008.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/SaradSV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SernaLM08, author = {Jetzabel M. Serna and Jesus Luna and Manel Medina}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Geolocation-Based Trust for Vanet's Privacy}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {287--290}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.21}, doi = {10.1109/IAS.2008.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/SernaLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ShaikhJdLSL08, author = {Riaz Ahmed Shaikh and Hassan Jameel and Brian J. d'Auriol and Sungyoung Lee and Young Jae Song and Heejo Lee}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Network Level Privacy for Wireless Sensor Networks}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {261--266}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.36}, doi = {10.1109/IAS.2008.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ShaikhJdLSL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/Shirali-ShahrezaS08, author = {Sajad Shirali{-}Shahreza and Mohammad Shirali{-}Shahreza}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Steganography in Textiles}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {56--61}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.11}, doi = {10.1109/IAS.2008.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/Shirali-ShahrezaS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/Shirali-ShahrezaS08a, author = {Mohammad Shirali{-}Shahreza and Sajad Shirali{-}Shahreza}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Persian/Arabic Unicode Text Steganography}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {62--66}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.12}, doi = {10.1109/IAS.2008.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/Shirali-ShahrezaS08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SnaselPKA08, author = {V{\'{a}}clav Sn{\'{a}}sel and Jan Platos and Pavel Kr{\"{o}}mer and Ajith Abraham}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {172--179}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.53}, doi = {10.1109/IAS.2008.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/SnaselPKA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SunithaA08, author = {N. R. Sunitha and B. B. Amberker}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using Bellare-Miner Scheme with Proxy Revocation}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {73--78}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.55}, doi = {10.1109/IAS.2008.55}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/SunithaA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/TamberiMSB08, author = {Francesco Tamberi and Dario Maggiari and Daniele Sgandurra and Fabrizio Baiardi}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Semantics-Driven Introspection in a Virtual Environment}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {299--302}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.17}, doi = {10.1109/IAS.2008.17}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/TamberiMSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/WangC08, author = {Xiaoming Wang and Huoyan Chen}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Threshold Proxy Signature Scheme with Strong Real-Time Efficiency}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {9--14}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.8}, doi = {10.1109/IAS.2008.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/WangC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/XiaoCZ08, author = {Hannan Xiao and Bruce Christianson and Ying Zhang}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {15--20}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.44}, doi = {10.1109/IAS.2008.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/XiaoCZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ZainalMSA08, author = {Anazida Zainal and Mohd Aizaini Maarof and Siti Mariyam Hj. Shamsuddin and Ajith Abraham}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Ensemble of One-Class Classifiers for Network Intrusion Detection System}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {180--185}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.35}, doi = {10.1109/IAS.2008.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ZainalMSA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ZhuS08, author = {Bonnie Zhu and Shankar Sastry}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Data Fusion Assurance for the Kalman Filter in Uncertain Networks}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {115--119}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.61}, doi = {10.1109/IAS.2008.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ZhuS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/IEEEias/2008, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4627042/proceeding}, isbn = {978-0-7695-3324-7}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.