Search dblp for Publications

export results for "toc:db/conf/raid/raid2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/raid/AbbasiWBZE14,
  author       = {Ali Abbasi and
                  Jos Wetzels and
                  Wouter Bokslag and
                  Emmanuele Zambon and
                  Sandro Etalle},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {On Emulation-Based Network Intrusion Detection Systems},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {384--404},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_19},
  doi          = {10.1007/978-3-319-11379-1\_19},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AbbasiWBZE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AmannHS14,
  author       = {Johanna Amann and
                  Seth Hall and
                  Robin Sommer},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Count Me In: Viable Distributed Summary Statistics for Securing High-Speed
                  Networks},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {320--340},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_16},
  doi          = {10.1007/978-3-319-11379-1\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AmannHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ApececheaIES14,
  author       = {Gorka Irazoqui Apecechea and
                  Mehmet Sinan Inci and
                  Thomas Eisenbarth and
                  Berk Sunar},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Wait a Minute! {A} fast, Cross-VM Attack on {AES}},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {299--319},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_15},
  doi          = {10.1007/978-3-319-11379-1\_15},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ApececheaIES14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BoggsDS14,
  author       = {Nathaniel Boggs and
                  Senyao Du and
                  Salvatore J. Stolfo},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Measuring Drive-by Download Defense in Depth},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {172--191},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_9},
  doi          = {10.1007/978-3-319-11379-1\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BoggsDS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BoggsZDS14,
  author       = {Nathaniel Boggs and
                  Hang Zhao and
                  Senyao Du and
                  Salvatore J. Stolfo},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Synthetic Data Generation and Defense in Depth Measurement of Web
                  Applications},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {234--254},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_12},
  doi          = {10.1007/978-3-319-11379-1\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BoggsZDS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BowersHJT14,
  author       = {Kevin D. Bowers and
                  Catherine Hart and
                  Ari Juels and
                  Nikos Triandopoulos},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {PillarBox: Combating Next-Generation Malware with Fast Forward-Secure
                  Logging},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {46--67},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_3},
  doi          = {10.1007/978-3-319-11379-1\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BowersHJT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BudiantoJDSL14,
  author       = {Enrico Budianto and
                  Yaoqi Jia and
                  Xinshu Dong and
                  Prateek Saxena and
                  Zhenkai Liang},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web
                  Browsers},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {150--171},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_8},
  doi          = {10.1007/978-3-319-11379-1\_8},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/BudiantoJDSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CaminaRM14,
  author       = {Jos{\'{e}} Benito Cami{\~{n}}a and
                  Jorge Rodr{\'{\i}}guez{-}Ruiz and
                  Ra{\'{u}}l Monroy},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Towards a Masquerade Detection System Based on User's Tasks},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {447--465},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_22},
  doi          = {10.1007/978-3-319-11379-1\_22},
  timestamp    = {Fri, 06 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/CaminaRM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CaoSBKVC14,
  author       = {Yinzhi Cao and
                  Yan Shoshitaishvili and
                  Kevin Borgolte and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna and
                  Yan Chen},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Protecting Web-Based Single Sign-on Protocols against Relying Party
                  Impersonation Attacks through a Dedicated Bi-directional Authenticated
                  Secure Channel},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {276--298},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_14},
  doi          = {10.1007/978-3-319-11379-1\_14},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CaoSBKVC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CorbettaIKV14,
  author       = {Jacopo Corbetta and
                  Luca Invernizzi and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Eyes of a Human, Eyes of a Program: Leveraging Different Views of
                  the Web for Analysis and Detection},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {130--149},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_7},
  doi          = {10.1007/978-3-319-11379-1\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CorbettaIKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HendaN14,
  author       = {Noomene Ben Henda and
                  Karl Norrman},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Formal Analysis of Security Procedures in {LTE} - {A} Feasibility
                  Study},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {341--361},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_17},
  doi          = {10.1007/978-3-319-11379-1\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HendaN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KhanAH14,
  author       = {Hassan Khan and
                  Aaron Atwater and
                  Urs Hengartner},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {A Comparative Evaluation of Implicit Authentication Schemes},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {255--275},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_13},
  doi          = {10.1007/978-3-319-11379-1\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KhanAH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KuhrerRH14,
  author       = {Marc K{\"{u}}hrer and
                  Christian Rossow and
                  Thorsten Holz},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Paint It Black: Evaluating the Effectiveness of Malware Blacklists},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_1},
  doi          = {10.1007/978-3-319-11379-1\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KuhrerRH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Kumar14,
  author       = {Apurva Kumar},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {A Lightweight Formal Approach for Analyzing Security of Web Protocols},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {192--211},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_10},
  doi          = {10.1007/978-3-319-11379-1\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Kumar14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LeeCKSK14,
  author       = {Il{-}Gu Lee and
                  Hyunwoo Choi and
                  Yongdae Kim and
                  Seungwon Shin and
                  Myungchul Kim},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Run Away If You Can: - Persistent Jamming Attacks against Channel
                  Hopping Wi-Fi Devices in Dense Networks},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {362--383},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_18},
  doi          = {10.1007/978-3-319-11379-1\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LeeCKSK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NayakMED14,
  author       = {Kartik Nayak and
                  Daniel Marino and
                  Petros Efstathopoulos and
                  Tudor Dumitras},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities
                  and Attack Surfaces in the Wild},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {426--446},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_21},
  doi          = {10.1007/978-3-319-11379-1\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NayakMED14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/OkhraviRC14,
  author       = {Hamed Okhravi and
                  James Riordan and
                  Kevin M. Carter},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Quantitative Evaluation of Dynamic Platform Techniques as a Defensive
                  Mechanism},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {405--425},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_20},
  doi          = {10.1007/978-3-319-11379-1\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/OkhraviRC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PappasPK14,
  author       = {Vasilis Pappas and
                  Michalis Polychronakis and
                  Angelos D. Keromytis},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Dynamic Reconstruction of Relocation Information for Stripped Binaries},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {68--87},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_4},
  doi          = {10.1007/978-3-319-11379-1\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/PappasPK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SchusterTPMSCH14,
  author       = {Felix Schuster and
                  Thomas Tendyck and
                  Jannik Pewny and
                  Andreas Maa{\ss} and
                  Martin Steegmanns and
                  Moritz Contag and
                  Thorsten Holz},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Evaluating the Effectiveness of Current Anti-ROP Defenses},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {88--108},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_5},
  doi          = {10.1007/978-3-319-11379-1\_5},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SchusterTPMSCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TangSS14,
  author       = {Adrian Tang and
                  Simha Sethumadhavan and
                  Salvatore J. Stolfo},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Unsupervised Anomaly-Based Malware Detection Using Hardware Features},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {109--129},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_6},
  doi          = {10.1007/978-3-319-11379-1\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TangSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WeissbacherLR14,
  author       = {Michael Weissbacher and
                  Tobias Lauinger and
                  William K. Robertson},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Why Is {CSP} Failing? Trends and Challenges in {CSP} Adoption},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {212--233},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_11},
  doi          = {10.1007/978-3-319-11379-1\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WeissbacherLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuZGL14,
  author       = {Zhaoyan Xu and
                  Jialong Zhang and
                  Guofei Gu and
                  Zhiqiang Lin},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted
                  Environment},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {22--45},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_2},
  doi          = {10.1007/978-3-319-11379-1\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/XuZGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2014,
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1},
  doi          = {10.1007/978-3-319-11379-1},
  isbn         = {978-3-319-11378-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics