Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/esorics/esorics2018-1.bht:"
@inproceedings{DBLP:conf/esorics/AlrabaeeS0DH18, author = {Saed Alrabaee and Paria Shirani and Lingyu Wang and Mourad Debbabi and Aiman Hanna}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {On Leveraging Coding Habits for Effective Binary Authorship Attribution}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {26--47}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_2}, doi = {10.1007/978-3-319-99073-6\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AlrabaeeS0DH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AmbrosinC0SS18, author = {Moreno Ambrosin and Mauro Conti and Ahmad Ibrahim and Ahmad{-}Reza Sadeghi and Matthias Schunter}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {SCIoT: {A} Secure and sCalable End-to-End Management Framework for IoT Devices}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {595--617}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_29}, doi = {10.1007/978-3-319-99073-6\_29}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AmbrosinC0SS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AndroulakiCCK18, author = {Elli Androulaki and Christian Cachin and Angelo De Caro and Eleftherios Kokoris{-}Kogias}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {111--131}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_6}, doi = {10.1007/978-3-319-99073-6\_6}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AndroulakiCCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BaeldeDH18, author = {David Baelde and St{\'{e}}phanie Delaune and Lucca Hirschi}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {{POR} for Security Protocol Equivalences - Beyond Action-Determinism}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {385--405}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_19}, doi = {10.1007/978-3-319-99073-6\_19}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BaeldeDH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BalaganiCGGGLMM18, author = {Kiran S. Balagani and Mauro Conti and Paolo Gasti and Martin Georgiev and Tristan Gurtler and Daniele Lain and Charissa Miller and Kendall Molas and Nikita Samarin and Eugen Saraci and Gene Tsudik and Lynn Wu}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {{SILK-TV:} Secret Information Leakage from Keystroke Timing Videos}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {263--280}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_13}, doi = {10.1007/978-3-319-99073-6\_13}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BalaganiCGGGLMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BittonGSIOYYES18, author = {Ron Bitton and Tomer Gluck and Orly Stan and Masaki Inokuchi and Yoshinobu Ohta and Yoshiyuki Yamada and Tomohiko Yagyu and Yuval Elovici and Asaf Shabtai}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Deriving a Cost-Effective Digital Twin of an {ICS} to Facilitate Security Evaluation}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {533--554}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_26}, doi = {10.1007/978-3-319-99073-6\_26}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BittonGSIOYYES18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BlassK18, author = {Erik{-}Oliver Blass and Florian Kerschbaum}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Strain: {A} Secure Auction for Blockchains}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {87--110}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_5}, doi = {10.1007/978-3-319-99073-6\_5}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BlassK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CortierDD18, author = {V{\'{e}}ronique Cortier and Antoine Dallon and St{\'{e}}phanie Delaune}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Efficiently Deciding Equivalence for Standard Primitives and Phases}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {491--511}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_24}, doi = {10.1007/978-3-319-99073-6\_24}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CortierDD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CuiJBOF18, author = {Qian Cui and Guy{-}Vincent Jourdan and Gregor von Bochmann and Iosif{-}Viorel Onut and Jason Flood}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Phishing Attacks Modifications and Evolutions}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {243--262}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_12}, doi = {10.1007/978-3-319-99073-6\_12}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CuiJBOF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GeGTXLY18, author = {Jingquan Ge and Neng Gao and Chenyang Tu and Ji Xiang and Zeyi Liu and Jun Yuan}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Combination of Hardware and Software: An Efficient {AES} Implementation Resistant to Side-Channel Attacks on All Programmable SoC}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {197--217}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_10}, doi = {10.1007/978-3-319-99073-6\_10}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GeGTXLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HanCSTW18, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Anonymous Single-Sign-On for n Designated Services with Traceability}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {470--490}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_23}, doi = {10.1007/978-3-319-99073-6\_23}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HanCSTW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HerrewegenG18, author = {Jan Van den Herrewegen and Flavio D. Garcia}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Beneath the Bonnet: {A} Breakdown of Diagnostic Security}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {305--324}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_15}, doi = {10.1007/978-3-319-99073-6\_15}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HerrewegenG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HessMB18, author = {Andreas V. Hess and Sebastian Alexander M{\"{o}}dersheim and Achim D. Brucker}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Stateful Protocol Composition}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {427--446}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_21}, doi = {10.1007/978-3-319-99073-6\_21}, timestamp = {Tue, 07 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HessMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JuutiSMA18, author = {Mika Juuti and Bo Sun and Tatsuya Mori and N. Asokan}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {132--151}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_7}, doi = {10.1007/978-3-319-99073-6\_7}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JuutiSMA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KarafiliC018, author = {Erisa Karafili and Matteo Cristani and Luca Vigan{\`{o}}}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {A Formal Approach to Analyzing Cyber-Forensics Evidence}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {281--301}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_14}, doi = {10.1007/978-3-319-99073-6\_14}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KarafiliC018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KeufferMC18, author = {Julien Keuffer and Refik Molva and Herv{\'{e}} Chabanne}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Efficient Proof Composition for Verifiable Computation}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {152--171}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_8}, doi = {10.1007/978-3-319-99073-6\_8}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KeufferMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KhakpourS18, author = {Narges Khakpour and Charilaos Skandylas}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Synthesis of a Permissive Security Monitor}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {48--65}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_3}, doi = {10.1007/978-3-319-99073-6\_3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KhakpourS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KirschZB018, author = {Julian Kirsch and Zhechko Zhechev and Bruno Bierbaumer and Thomas Kittel}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {PwIN - Pwning Intel piN: Why {DBI} is Unsuitable for Security Applications}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {363--382}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_18}, doi = {10.1007/978-3-319-99073-6\_18}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KirschZB018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KohlsP18, author = {Katharina Kohls and Christina P{\"{o}}pper}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {DigesTor: Comparing Passive Traffic Analysis Attacks on Tor}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {512--530}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_25}, doi = {10.1007/978-3-319-99073-6\_25}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KohlsP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LapidW18, author = {Ben Lapid and Avishai Wool}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {175--196}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_9}, doi = {10.1007/978-3-319-99073-6\_9}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LapidW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiaoCZY018, author = {Yibin Liao and Ruoyan Cai and Guodong Zhu and Yue Yin and Kang Li}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {MobileFindr: Function Similarity Identification for Reversing Mobile Binaries}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {66--83}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_4}, doi = {10.1007/978-3-319-99073-6\_4}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiaoCZY018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MantelSWW18, author = {Heiko Mantel and Johannes Schickel and Alexandra Weber and Friedrich Weber}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {How Secure Is Green IT? The Case of Software-Based Energy Side Channels}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {218--239}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_11}, doi = {10.1007/978-3-319-99073-6\_11}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MantelSWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MauwSTT18, author = {Sjouke Mauw and Zach Smith and Jorge Toro{-}Pozo and Rolando Trujillo{-}Rasua}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Automated Identification of Desynchronisation Attacks on Shared Secrets}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {406--426}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_20}, doi = {10.1007/978-3-319-99073-6\_20}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MauwSTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MunteanWGE18, author = {Paul Muntean and Sebastian Wuerl and Jens Grossklags and Claudia Eckert}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {CastSan: Efficient Detection of Polymorphic {C++} Object Type Confusions with {LLVM}}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {3--25}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_1}, doi = {10.1007/978-3-319-99073-6\_1}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/MunteanWGE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RubioRAZ18, author = {Juan E. Rubio and Rodrigo Roman and Cristina Alcaraz and Yan Zhang}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Tracking Advanced Persistent Threats in Critical Infrastructures Through Opinion Dynamics}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {555--574}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_27}, doi = {10.1007/978-3-319-99073-6\_27}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/RubioRAZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/StergiopoulosTB18, author = {George Stergiopoulos and Alexander Talavari and Evangelos Bitsikas and Dimitris Gritzalis}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Automatic Detection of Various Malicious Traffic Using Side Channel Features on {TCP} Packets}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {346--362}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_17}, doi = {10.1007/978-3-319-99073-6\_17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/StergiopoulosTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/StoneCR18, author = {Chris McMahon Stone and Tom Chothia and Joeri de Ruiter}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Extending Automated Protocol State Learning for the 802.11 4-Way Handshake}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {325--345}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_16}, doi = {10.1007/978-3-319-99073-6\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/StoneCR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/UrbanTHP18, author = {Tobias Urban and Dennis Tatang and Thorsten Holz and Norbert Pohlmann}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {449--469}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_22}, doi = {10.1007/978-3-319-99073-6\_22}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/UrbanTHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YangSLL18, author = {Lei Yang and Chris Seasholtz and Bo Luo and Fengjun Li}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {575--594}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_28}, doi = {10.1007/978-3-319-99073-6\_28}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/YangSLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2018-1, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6}, doi = {10.1007/978-3-319-99073-6}, isbn = {978-3-319-99072-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2018-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.