Search dblp for Publications

export results for "toc:db/journals/compsec/compsec73.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AdiHP18,
  author       = {Kamel Adi and
                  Lamia Hamza and
                  Liviu Pene},
  title        = {Automatic security policy enforcement in computer systems},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {156--171},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.012},
  doi          = {10.1016/J.COSE.2017.10.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AdiHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ali-GombeSRXR18,
  author       = {Aisha I. Ali{-}Gombe and
                  Brendan Saltaformaggio and
                  J. Ramanujam and
                  Dongyan Xu and
                  Golden G. Richard III},
  title        = {Toward a more dependable hybrid analysis of android malware using
                  aspect-oriented programming},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {235--248},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.006},
  doi          = {10.1016/J.COSE.2017.11.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ali-GombeSRXR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlizadehLFZA18,
  author       = {Mahdi Alizadeh and
                  Xixi Lu and
                  Dirk Fahland and
                  Nicola Zannone and
                  Wil M. P. van der Aalst},
  title        = {Linking data and process perspectives for conformance analysis},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {172--193},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.010},
  doi          = {10.1016/J.COSE.2017.10.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlizadehLFZA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlvarengaBMCZ18,
  author       = {Sean Carlisto de Alvarenga and
                  Sylvio Barbon and
                  Rodrigo Sanches Miani and
                  Michel Cukier and
                  Bruno Bogaz Zarpel{\~{a}}o},
  title        = {Process mining and hierarchical clustering to help intrusion alert
                  visualization},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {474--491},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.021},
  doi          = {10.1016/J.COSE.2017.11.021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlvarengaBMCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AurigemmaM18,
  author       = {Salvatore Aurigemma and
                  Thomas Mattson},
  title        = {Exploring the effect of uncertainty avoidance on taking voluntary
                  protective security actions},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {219--234},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.001},
  doi          = {10.1016/J.COSE.2017.11.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AurigemmaM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BaseriHC18,
  author       = {Yaser Baseri and
                  Abdelhakim Hafid and
                  Soumaya Cherkaoui},
  title        = {Privacy preserving fine-grained location-based access control for
                  mobile cloud},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {249--265},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.014},
  doi          = {10.1016/J.COSE.2017.10.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BaseriHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BittonFSPRS18,
  author       = {Ron Bitton and
                  Andrey Finkelshtein and
                  Lior Sidi and
                  Rami Puzis and
                  Lior Rokach and
                  Asaf Shabtai},
  title        = {Taxonomy of mobile users' security awareness},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {266--293},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.015},
  doi          = {10.1016/J.COSE.2017.10.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BittonFSPRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BuchlerRMLG18,
  author       = {Norbou Buchler and
                  Prashanth Rajivan and
                  Laura R. Marusich and
                  Lewis Lightner and
                  Cleotilde Gonzalez},
  title        = {Sociometrics and observational assessment of teaming and leadership
                  in a cyber security defense competition},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {114--136},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.013},
  doi          = {10.1016/J.COSE.2017.10.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BuchlerRMLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BurnapFTJ18,
  author       = {Pete Burnap and
                  Richard French and
                  Frederick Turner and
                  Kevin Jones},
  title        = {Malware classification using self organising feature maps and machine
                  activity data},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {399--410},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.016},
  doi          = {10.1016/J.COSE.2017.11.016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BurnapFTJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BushouseR18,
  author       = {Micah Bushouse and
                  Douglas S. Reeves},
  title        = {Goalkeeper: Comprehensive process enforcement from the hypervisor},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {459--473},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.020},
  doi          = {10.1016/J.COSE.2017.11.020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BushouseR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenXFHXZL18,
  author       = {Sen Chen and
                  Minhui Xue and
                  Lingling Fan and
                  Shuang Hao and
                  Lihua Xu and
                  Haojin Zhu and
                  Bo Li},
  title        = {Automated poisoning attacks and defenses in malware detection systems:
                  An adversarial machine learning approach},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {326--344},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.007},
  doi          = {10.1016/J.COSE.2017.11.007},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenXFHXZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CoulterP18,
  author       = {Rory Coulter and
                  Lei Pan},
  title        = {Intelligent agents defending for an IoT world: {A} review},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {439--458},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.014},
  doi          = {10.1016/J.COSE.2017.11.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CoulterP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DasCCLZ18,
  author       = {Sanjeev Das and
                  Bihuan Chen and
                  Mahinthan Chandramohan and
                  Yang Liu and
                  Wei Zhang},
  title        = {ROPSentry: Runtime defense against {ROP} attacks using hardware performance
                  counters},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {374--388},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.011},
  doi          = {10.1016/J.COSE.2017.11.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DasCCLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DingXCL18,
  author       = {Yuxin Ding and
                  Xiaoling Xia and
                  Sheng Chen and
                  Ye Li},
  title        = {A malware detection method based on family behavior graph},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {73--86},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.007},
  doi          = {10.1016/J.COSE.2017.10.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DingXCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GanesanMS18,
  author       = {Vennila Ganesan and
                  M. S. K. Manikandan and
                  M. N. Suresh},
  title        = {Dynamic voice spammers detection using Hidden Markov Model for Voice
                  over Internet Protocol network},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {1--16},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.003},
  doi          = {10.1016/J.COSE.2017.10.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GanesanMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GoelJ18,
  author       = {Diksha Goel and
                  Ankit Kumar Jain},
  title        = {Mobile phishing attacks and defence mechanisms: State of art and open
                  research challenges},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {519--544},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.12.006},
  doi          = {10.1016/J.COSE.2017.12.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GoelJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Gomez-Hernandez18,
  author       = {Jos{\'{e}} Antonio G{\'{o}}mez{-}Hern{\'{a}}ndez and
                  L. {\'{A}}lvarez{-}Gonz{\'{a}}lez and
                  Pedro Garc{\'{\i}}a{-}Teodoro},
  title        = {R-Locker: Thwarting ransomware action through a honeyfile-based approach},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {389--398},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.019},
  doi          = {10.1016/J.COSE.2017.11.019},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Gomez-Hernandez18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GratianBCDG18,
  author       = {Margaret Gratian and
                  Sruthi Bandi and
                  Michel Cukier and
                  Josiah Dykstra and
                  Amy Ginther},
  title        = {Correlating human traits and cyber security behavior intentions},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {345--358},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.015},
  doi          = {10.1016/J.COSE.2017.11.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GratianBCDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuoZ18,
  author       = {Yimin Guo and
                  Zhenfeng Zhang},
  title        = {{LPSE:} Lightweight password-strength estimation for password meters},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {507--518},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.07.012},
  doi          = {10.1016/J.COSE.2017.07.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuoZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HamedDK18,
  author       = {Tarfa Hamed and
                  Rozita Dara and
                  Stefan C. Kremer},
  title        = {Network intrusion detection system based on recursive feature addition
                  and bigram technique},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {137--155},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.011},
  doi          = {10.1016/J.COSE.2017.10.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HamedDK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hatfield18,
  author       = {Joseph M. Hatfield},
  title        = {Social engineering in cybersecurity: The evolution of a concept},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {102--113},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.008},
  doi          = {10.1016/J.COSE.2017.10.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hatfield18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Horsman18,
  author       = {Graeme Horsman},
  title        = {Framework for Reliable Experimental Design {(FRED):} {A} research
                  framework to ensure the dependable interpretation of digital data
                  for digital forensics},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {294--306},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.009},
  doi          = {10.1016/J.COSE.2017.11.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Horsman18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JamilKAAJJ18,
  author       = {Fuzel Jamil and
                  Abid Khan and
                  Adeel Anjum and
                  Mansoor Ahmed and
                  Farhana Jabeen and
                  Nadeem Javaid},
  title        = {Secure provenance using an authenticated data structure approach},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {34--56},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.005},
  doi          = {10.1016/J.COSE.2017.10.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JamilKAAJJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KaropoulosNX18,
  author       = {Georgios Karopoulos and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {{MASKER:} Masking for privacy-preserving aggregation in the smart
                  grid ecosystem},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {307--325},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.008},
  doi          = {10.1016/J.COSE.2017.11.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KaropoulosNX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LinPL18,
  author       = {Chih{-}Hung Lin and
                  Hsing{-}Kuo Pao and
                  Jian{-}Wei Liao},
  title        = {Efficient dynamic malware analysis using virtual time control mechanics},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {359--373},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.010},
  doi          = {10.1016/J.COSE.2017.11.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LinPL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LuoXHWF18,
  author       = {Yuchuan Luo and
                  Ming Xu and
                  Kai Huang and
                  Dongsheng Wang and
                  Shaojing Fu},
  title        = {Efficient auditing for shared data in the cloud with secure user revocation
                  and computations outsourcing},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {492--506},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.12.004},
  doi          = {10.1016/J.COSE.2017.12.004},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LuoXHWF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Macia-Fernandez18,
  author       = {Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and
                  Jos{\'{e}} Camacho and
                  Roberto Mag{\'{a}}n{-}Carri{\'{o}}n and
                  Pedro Garc{\'{\i}}a{-}Teodoro and
                  Roberto Ther{\'{o}}n},
  title        = {UGR'16: {A} new dataset for the evaluation of cyclostationarity-based
                  network IDSs},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {411--424},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.004},
  doi          = {10.1016/J.COSE.2017.11.004},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Macia-Fernandez18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaoZZXZ18,
  author       = {Yunlong Mao and
                  Yuan Zhang and
                  Xiaoyan Zhang and
                  Fengyuan Xu and
                  Sheng Zhong},
  title        = {Location privacy in public access points positioning: An optimization
                  and geometry approach},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {425--438},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.005},
  doi          = {10.1016/J.COSE.2017.11.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MaoZZXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MengesP18,
  author       = {Florian Menges and
                  G{\"{u}}nther Pernul},
  title        = {A comparative analysis of incident reporting formats},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {87--101},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.009},
  doi          = {10.1016/J.COSE.2017.10.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MengesP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PatsakisCPMP18,
  author       = {Constantinos Patsakis and
                  Athanasios Charemis and
                  Achilleas Papageorgiou and
                  Dimitrios Mermigas and
                  Sotirios Pirounias},
  title        = {The market's response toward privacy and mass surveillance: The Snowden
                  aftermath},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {194--206},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.002},
  doi          = {10.1016/J.COSE.2017.11.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PatsakisCPMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SepczukK18,
  author       = {Mariusz Sepczuk and
                  Zbigniew Kotulski},
  title        = {A new risk-based authentication management model oriented on user's
                  experience},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {17--33},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.002},
  doi          = {10.1016/J.COSE.2017.10.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SepczukK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WeiHZQZZ18,
  author       = {Hang Wei and
                  Guan{-}Yu Hu and
                  Zhi{-}Jie Zhou and
                  Peili Qiao and
                  Zhiguo Zhou and
                  Youmin Zhang},
  title        = {A new {BRB} model for security-state assessment of cloud computing
                  based on the impact of external and internal environments},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {207--218},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.003},
  doi          = {10.1016/J.COSE.2017.11.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WeiHZQZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Zhuang18,
  author       = {Yan Zhuang},
  title        = {The performance cost of software obfuscation for Android applications},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {57--72},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.004},
  doi          = {10.1016/J.COSE.2017.10.004},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Zhuang18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics