![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "stream:conf/epsec:"
@proceedings{DBLP:conf/epsec/2015, editor = {Victor Chang and Muthu Ramachandran and Robert John Walters and Gary B. Wills}, title = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10131}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-54380-2}, doi = {10.1007/978-3-319-54380-2}, isbn = {978-3-319-54379-6}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/epsec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epsec/AaberWC15, author = {Zeyad S. Aaber and Gary B. Wills and Richard M. Crowder}, editor = {Victor Chang and Muthu Ramachandran and Robert John Walters and Gary B. Wills}, title = {Protecting Document Outside Enterprise Network: {A} Confirmed Framework}, booktitle = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10131}, pages = {259--275}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-54380-2\_12}, doi = {10.1007/978-3-319-54380-2\_12}, timestamp = {Tue, 29 Sep 2020 09:39:42 +0200}, biburl = {https://dblp.org/rec/conf/epsec/AaberWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epsec/AlassafiHGWW15, author = {Madini O. Alassafi and Raid K. Hussain and Ghada Ghashgari and Robert John Walters and Gary B. Wills}, editor = {Victor Chang and Muthu Ramachandran and Robert John Walters and Gary B. Wills}, title = {Security in Organisations: Governance, Risks and Vulnerabilities in Moving to the Cloud}, booktitle = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10131}, pages = {241--258}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-54380-2\_11}, doi = {10.1007/978-3-319-54380-2\_11}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/epsec/AlassafiHGWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epsec/DuncanWJZ15, author = {Bob Duncan and Mark Whittington and Martin Gilje Jaatun and Alfredo Ramiro Reyes Z{\'{u}}{\~{n}}iga}, editor = {Victor Chang and Muthu Ramachandran and Robert John Walters and Gary B. Wills}, title = {Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?}, booktitle = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10131}, pages = {19--39}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-54380-2\_2}, doi = {10.1007/978-3-319-54380-2\_2}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/epsec/DuncanWJZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epsec/FerdousCP15, author = {Md. Sadek Ferdous and Farida Chowdhury and Ron Poet}, editor = {Victor Chang and Muthu Ramachandran and Robert John Walters and Gary B. Wills}, title = {A Hybrid Model of Attribute Aggregation in Federated Identity Management}, booktitle = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10131}, pages = {120--154}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-54380-2\_6}, doi = {10.1007/978-3-319-54380-2\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/epsec/FerdousCP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epsec/GhaffariFA15, author = {Ahmad Ghaffari and Amin Hosseinian Far and Akbar Sheikh Akbari}, editor = {Victor Chang and Muthu Ramachandran and Robert John Walters and Gary B. Wills}, title = {Iris Biometrics Recognition in Security Management}, booktitle = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10131}, pages = {73--96}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-54380-2\_4}, doi = {10.1007/978-3-319-54380-2\_4}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/epsec/GhaffariFA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epsec/HosseinzadehLRH15, author = {Shohreh Hosseinzadeh and Samuel Laur{\'{e}}n and Sampsa Rauti and Sami Hyrynsalmi and Mauro Conti and Ville Lepp{\"{a}}nen}, editor = {Victor Chang and Muthu Ramachandran and Robert John Walters and Gary B. Wills}, title = {Obfuscation and Diversification for Securing Cloud Computing}, booktitle = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10131}, pages = {179--202}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-54380-2\_8}, doi = {10.1007/978-3-319-54380-2\_8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/epsec/HosseinzadehLRH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epsec/JahankhaniF15, author = {Hamid Jahankhani and Amin Hosseinian Far}, editor = {Victor Chang and Muthu Ramachandran and Robert John Walters and Gary B. Wills}, title = {Challenges of Cloud Forensics}, booktitle = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10131}, pages = {1--18}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-54380-2\_1}, doi = {10.1007/978-3-319-54380-2\_1}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/epsec/JahankhaniF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epsec/KhanSK15, author = {M. Fahim Ferdous Khan and Ken Sakamura and Noboru Koshizuka}, editor = {Victor Chang and Muthu Ramachandran and Robert John Walters and Gary B. Wills}, title = {Robust Enterprise Application Security with eTRON Architecture}, booktitle = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10131}, pages = {155--178}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-54380-2\_7}, doi = {10.1007/978-3-319-54380-2\_7}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/epsec/KhanSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epsec/Lu15, author = {Yaotai Lu}, editor = {Victor Chang and Muthu Ramachandran and Robert John Walters and Gary B. Wills}, title = {The Relationship Between Public Budgeting and Risk Management: Competition or Driving?}, booktitle = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10131}, pages = {40--72}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-54380-2\_3}, doi = {10.1007/978-3-319-54380-2\_3}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/epsec/Lu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epsec/Romero-MarionaH15, author = {Jose Romero{-}Mariona and Roger Hallman and Megan Kline and Geancarlo Palavicini and Josiah Bryan and John San Miguel and Lawrence Kerr and Maxine Major and Jorge Alvarez}, editor = {Victor Chang and Muthu Ramachandran and Robert John Walters and Gary B. Wills}, title = {An Approach to Organizational Cybersecurity}, booktitle = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10131}, pages = {203--222}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-54380-2\_9}, doi = {10.1007/978-3-319-54380-2\_9}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/epsec/Romero-MarionaH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epsec/UmerS15, author = {Muhammad Fahad Umer and Muhammad Sher}, editor = {Victor Chang and Muthu Ramachandran and Robert John Walters and Gary B. Wills}, title = {Automatic Clustering of Malicious {IP} Flow Records Using Unsupervised Learning}, booktitle = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10131}, pages = {97--119}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-54380-2\_5}, doi = {10.1007/978-3-319-54380-2\_5}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/epsec/UmerS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epsec/YahyaWW15, author = {Fara Yahya and Robert John Walters and Gary B. Wills}, editor = {Victor Chang and Muthu Ramachandran and Robert John Walters and Gary B. Wills}, title = {Using Goal-Question-Metric {(GQM)} Approach to Assess Security in Cloud Storage}, booktitle = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10131}, pages = {223--240}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-54380-2\_10}, doi = {10.1007/978-3-319-54380-2\_10}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/epsec/YahyaWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.