Search dblp for Publications

export results for "stream:conf/epsec:"

 download as .bib file

@proceedings{DBLP:conf/epsec/2015,
  editor       = {Victor Chang and
                  Muthu Ramachandran and
                  Robert John Walters and
                  Gary B. Wills},
  title        = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
                  BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10131},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-54380-2},
  doi          = {10.1007/978-3-319-54380-2},
  isbn         = {978-3-319-54379-6},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/epsec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epsec/AaberWC15,
  author       = {Zeyad S. Aaber and
                  Gary B. Wills and
                  Richard M. Crowder},
  editor       = {Victor Chang and
                  Muthu Ramachandran and
                  Robert John Walters and
                  Gary B. Wills},
  title        = {Protecting Document Outside Enterprise Network: {A} Confirmed Framework},
  booktitle    = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
                  BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10131},
  pages        = {259--275},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-54380-2\_12},
  doi          = {10.1007/978-3-319-54380-2\_12},
  timestamp    = {Tue, 29 Sep 2020 09:39:42 +0200},
  biburl       = {https://dblp.org/rec/conf/epsec/AaberWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epsec/AlassafiHGWW15,
  author       = {Madini O. Alassafi and
                  Raid K. Hussain and
                  Ghada Ghashgari and
                  Robert John Walters and
                  Gary B. Wills},
  editor       = {Victor Chang and
                  Muthu Ramachandran and
                  Robert John Walters and
                  Gary B. Wills},
  title        = {Security in Organisations: Governance, Risks and Vulnerabilities in
                  Moving to the Cloud},
  booktitle    = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
                  BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10131},
  pages        = {241--258},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-54380-2\_11},
  doi          = {10.1007/978-3-319-54380-2\_11},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/epsec/AlassafiHGWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epsec/DuncanWJZ15,
  author       = {Bob Duncan and
                  Mark Whittington and
                  Martin Gilje Jaatun and
                  Alfredo Ramiro Reyes Z{\'{u}}{\~{n}}iga},
  editor       = {Victor Chang and
                  Muthu Ramachandran and
                  Robert John Walters and
                  Gary B. Wills},
  title        = {Could the Outsourcing of Incident Response Management Provide a Blueprint
                  for Managing Other Cloud Security Requirements?},
  booktitle    = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
                  BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10131},
  pages        = {19--39},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-54380-2\_2},
  doi          = {10.1007/978-3-319-54380-2\_2},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/epsec/DuncanWJZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epsec/FerdousCP15,
  author       = {Md. Sadek Ferdous and
                  Farida Chowdhury and
                  Ron Poet},
  editor       = {Victor Chang and
                  Muthu Ramachandran and
                  Robert John Walters and
                  Gary B. Wills},
  title        = {A Hybrid Model of Attribute Aggregation in Federated Identity Management},
  booktitle    = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
                  BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10131},
  pages        = {120--154},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-54380-2\_6},
  doi          = {10.1007/978-3-319-54380-2\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/epsec/FerdousCP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epsec/GhaffariFA15,
  author       = {Ahmad Ghaffari and
                  Amin Hosseinian Far and
                  Akbar Sheikh Akbari},
  editor       = {Victor Chang and
                  Muthu Ramachandran and
                  Robert John Walters and
                  Gary B. Wills},
  title        = {Iris Biometrics Recognition in Security Management},
  booktitle    = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
                  BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10131},
  pages        = {73--96},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-54380-2\_4},
  doi          = {10.1007/978-3-319-54380-2\_4},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/epsec/GhaffariFA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epsec/HosseinzadehLRH15,
  author       = {Shohreh Hosseinzadeh and
                  Samuel Laur{\'{e}}n and
                  Sampsa Rauti and
                  Sami Hyrynsalmi and
                  Mauro Conti and
                  Ville Lepp{\"{a}}nen},
  editor       = {Victor Chang and
                  Muthu Ramachandran and
                  Robert John Walters and
                  Gary B. Wills},
  title        = {Obfuscation and Diversification for Securing Cloud Computing},
  booktitle    = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
                  BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10131},
  pages        = {179--202},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-54380-2\_8},
  doi          = {10.1007/978-3-319-54380-2\_8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/epsec/HosseinzadehLRH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epsec/JahankhaniF15,
  author       = {Hamid Jahankhani and
                  Amin Hosseinian Far},
  editor       = {Victor Chang and
                  Muthu Ramachandran and
                  Robert John Walters and
                  Gary B. Wills},
  title        = {Challenges of Cloud Forensics},
  booktitle    = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
                  BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10131},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-54380-2\_1},
  doi          = {10.1007/978-3-319-54380-2\_1},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/epsec/JahankhaniF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epsec/KhanSK15,
  author       = {M. Fahim Ferdous Khan and
                  Ken Sakamura and
                  Noboru Koshizuka},
  editor       = {Victor Chang and
                  Muthu Ramachandran and
                  Robert John Walters and
                  Gary B. Wills},
  title        = {Robust Enterprise Application Security with eTRON Architecture},
  booktitle    = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
                  BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10131},
  pages        = {155--178},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-54380-2\_7},
  doi          = {10.1007/978-3-319-54380-2\_7},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/epsec/KhanSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epsec/Lu15,
  author       = {Yaotai Lu},
  editor       = {Victor Chang and
                  Muthu Ramachandran and
                  Robert John Walters and
                  Gary B. Wills},
  title        = {The Relationship Between Public Budgeting and Risk Management: Competition
                  or Driving?},
  booktitle    = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
                  BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10131},
  pages        = {40--72},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-54380-2\_3},
  doi          = {10.1007/978-3-319-54380-2\_3},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/epsec/Lu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epsec/Romero-MarionaH15,
  author       = {Jose Romero{-}Mariona and
                  Roger Hallman and
                  Megan Kline and
                  Geancarlo Palavicini and
                  Josiah Bryan and
                  John San Miguel and
                  Lawrence Kerr and
                  Maxine Major and
                  Jorge Alvarez},
  editor       = {Victor Chang and
                  Muthu Ramachandran and
                  Robert John Walters and
                  Gary B. Wills},
  title        = {An Approach to Organizational Cybersecurity},
  booktitle    = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
                  BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10131},
  pages        = {203--222},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-54380-2\_9},
  doi          = {10.1007/978-3-319-54380-2\_9},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/epsec/Romero-MarionaH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epsec/UmerS15,
  author       = {Muhammad Fahad Umer and
                  Muhammad Sher},
  editor       = {Victor Chang and
                  Muthu Ramachandran and
                  Robert John Walters and
                  Gary B. Wills},
  title        = {Automatic Clustering of Malicious {IP} Flow Records Using Unsupervised
                  Learning},
  booktitle    = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
                  BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10131},
  pages        = {97--119},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-54380-2\_5},
  doi          = {10.1007/978-3-319-54380-2\_5},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/epsec/UmerS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epsec/YahyaWW15,
  author       = {Fara Yahya and
                  Robert John Walters and
                  Gary B. Wills},
  editor       = {Victor Chang and
                  Muthu Ramachandran and
                  Robert John Walters and
                  Gary B. Wills},
  title        = {Using Goal-Question-Metric {(GQM)} Approach to Assess Security in
                  Cloud Storage},
  booktitle    = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
                  BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10131},
  pages        = {223--240},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-54380-2\_10},
  doi          = {10.1007/978-3-319-54380-2\_10},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/epsec/YahyaWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics