Search dblp for Publications

export results for "toc:db/conf/safeconfig/safeconfig2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/safeconfig/AlsalehA14,
  author       = {Mohammed Noraden Alsaleh and
                  Ehab Al{-}Shaer},
  editor       = {Ehab Al{-}Shaer and
                  Krishna Kant},
  title        = {Enterprise Risk Assessment Based on Compliance Reports and Vulnerability
                  Scoring Systems},
  booktitle    = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence
                  and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  pages        = {25--28},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665936.2665941},
  doi          = {10.1145/2665936.2665941},
  timestamp    = {Thu, 13 Feb 2020 15:16:46 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/AlsalehA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/Bauer14,
  author       = {Lujo Bauer},
  editor       = {Ehab Al{-}Shaer and
                  Krishna Kant},
  title        = {Human Factors, Defaults, and Automation: Challenges and Opporunities},
  booktitle    = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence
                  and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  pages        = {37},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665936.2668880},
  doi          = {10.1145/2665936.2668880},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/Bauer14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/ChenNDH14,
  author       = {Ping Chen and
                  Nick Nikiforakis and
                  Lieven Desmet and
                  Christophe Huygens},
  editor       = {Ehab Al{-}Shaer and
                  Krishna Kant},
  title        = {Security Analysis of the Chinese Web: How well is it protected?},
  booktitle    = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence
                  and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  pages        = {3--9},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665936.2665938},
  doi          = {10.1145/2665936.2665938},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/ChenNDH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/GillaniA14,
  author       = {Fida Gillani and
                  Ehab Al{-}Shaer},
  editor       = {Ehab Al{-}Shaer and
                  Krishna Kant},
  title        = {Improving Efficiency of Spam Detection using Economic Model},
  booktitle    = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence
                  and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665936.2665942},
  doi          = {10.1145/2665936.2665942},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/GillaniA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/Gunter14,
  author       = {Carl A. Gunter},
  editor       = {Ehab Al{-}Shaer and
                  Krishna Kant},
  title        = {Detecting Roles and Anomalies in Hospital Access Audit Logs},
  booktitle    = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence
                  and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665936.2668879},
  doi          = {10.1145/2665936.2668879},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/Gunter14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/SunJ14,
  author       = {Kun Sun and
                  Sushil Jajodia},
  editor       = {Ehab Al{-}Shaer and
                  Krishna Kant},
  title        = {Protecting Enterprise Networks through Attack Surface Expansion},
  booktitle    = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence
                  and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  pages        = {29--32},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665936.2665939},
  doi          = {10.1145/2665936.2665939},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/SunJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/TanakaG14,
  author       = {Yasuyuki Tanaka and
                  Atsuhiro Goto},
  editor       = {Ehab Al{-}Shaer and
                  Krishna Kant},
  title        = {n-ROPdetector: Proposal of a Method to Detect the {ROP} Attack Code
                  on the Network},
  booktitle    = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence
                  and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  pages        = {33--36},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665936.2665937},
  doi          = {10.1145/2665936.2665937},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/TanakaG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/TateC14,
  author       = {Jeremy Tate and
                  T. Charles Clancy},
  editor       = {Ehab Al{-}Shaer and
                  Krishna Kant},
  title        = {Secure and Tamper Proof Code Management},
  booktitle    = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence
                  and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  pages        = {19--24},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665936.2665940},
  doi          = {10.1145/2665936.2665940},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/TateC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/safeconfig/2014,
  editor       = {Ehab Al{-}Shaer and
                  Krishna Kant},
  title        = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence
                  and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665936},
  doi          = {10.1145/2665936},
  isbn         = {978-1-4503-3147-0},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics