Search dblp for Publications

export results for "toc:db/conf/skm/skm2021.bht:"

 download as .bib file

@proceedings{DBLP:conf/skm/2021,
  editor       = {Ram Krishnan and
                  H. Raghav Rao and
                  Sanjay K. Sahay and
                  Sagar Samtani and
                  Ziming Zhao},
  title        = {Secure Knowledge Management In The Artificial Intelligence Era - 9th
                  International Conference, {SKM} 2021, San Antonio, TX, USA, October
                  8-9, 2021, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1549},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97532-6},
  doi          = {10.1007/978-3-030-97532-6},
  isbn         = {978-3-030-97531-9},
  timestamp    = {Thu, 03 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/0002WR21,
  author       = {Yuan Li and
                  Jingguo Wang and
                  H. Raghav Rao},
  title        = {Metacognitive Skills in Phishing Email Detection: {A} Study of Calibration
                  and Resolution},
  booktitle    = {{SKM}},
  pages        = {37--47},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97532-6\_3},
  doi          = {10.1007/978-3-030-97532-6\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/0002WR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/DanielMA21,
  author       = {Clinton Daniel and
                  Matthew Mullarkey and
                  Manish Agrawal},
  title        = {{RQ} Labs: {A} Cybersecurity Workforce Talent Program Design},
  booktitle    = {{SKM}},
  pages        = {171--185},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97532-6\_10},
  doi          = {10.1007/978-3-030-97532-6\_10},
  timestamp    = {Sat, 18 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/DanielMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/IyerSR21,
  author       = {Vivek Iyer and
                  Lalit Mohan Sanagavarapu and
                  Y. Raghu Reddy},
  title        = {A Framework for Syntactic and Semantic Quality Evaluation of Ontologies},
  booktitle    = {{SKM}},
  pages        = {73--93},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97532-6\_5},
  doi          = {10.1007/978-3-030-97532-6\_5},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/IyerSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/KlepetkoK21,
  author       = {Randy Klepetko and
                  Ram Krishnan},
  title        = {Analyzing {CNN} Models' Sensitivity to the Ordering of Non-natural
                  Data},
  booktitle    = {{SKM}},
  pages        = {130--148},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97532-6\_8},
  doi          = {10.1007/978-3-030-97532-6\_8},
  timestamp    = {Thu, 03 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/KlepetkoK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/LawalK21,
  author       = {Sherifdeen Lawal and
                  Ram Krishnan},
  title        = {Attribute-Based Access Control Policy Review in Permissioned Blockchain},
  booktitle    = {{SKM}},
  pages        = {97--109},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97532-6\_6},
  doi          = {10.1007/978-3-030-97532-6\_6},
  timestamp    = {Thu, 03 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/LawalK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/NosenkoCC21,
  author       = {Alex Nosenko and
                  Yuan Cheng and
                  Haiquan Chen},
  title        = {Learning Password Modification Patterns with Recurrent Neural Networks},
  booktitle    = {{SKM}},
  pages        = {110--129},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97532-6\_7},
  doi          = {10.1007/978-3-030-97532-6\_7},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/NosenkoCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/RathoreBSS21,
  author       = {Hemant Rathore and
                  Taeeb Bandwala and
                  Sanjay K. Sahay and
                  Mohit Sewak},
  title        = {Adversarial Robustness of Image Based Android Malware Detection Models},
  booktitle    = {{SKM}},
  pages        = {3--22},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97532-6\_1},
  doi          = {10.1007/978-3-030-97532-6\_1},
  timestamp    = {Thu, 03 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/RathoreBSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/ReuterL0K21,
  author       = {Lenhard Reuter and
                  Maria Leitner and
                  Paul Smith and
                  Manuel Koschuch},
  title        = {Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber
                  Physical Systems},
  booktitle    = {{SKM}},
  pages        = {151--170},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97532-6\_9},
  doi          = {10.1007/978-3-030-97532-6\_9},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/ReuterL0K21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/Rubio-MedranoHC21,
  author       = {Carlos E. Rubio{-}Medrano and
                  Matthew Hill and
                  Luis M. Claramunt and
                  Jaejong Baek and
                  Gail{-}Joon Ahn},
  title        = {DyPolDroid: Protecting Users and Organizations from Permission-Abuse
                  Attacks in Android},
  booktitle    = {{SKM}},
  pages        = {23--36},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97532-6\_2},
  doi          = {10.1007/978-3-030-97532-6\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/skm/Rubio-MedranoHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/SewakSR21,
  author       = {Mohit Sewak and
                  Sanjay K. Sahay and
                  Hemant Rathore},
  title        = {Deep Reinforcement Learning for Cybersecurity Threat Detection and
                  Protection: {A} Review},
  booktitle    = {{SKM}},
  pages        = {51--72},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97532-6\_4},
  doi          = {10.1007/978-3-030-97532-6\_4},
  timestamp    = {Thu, 03 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/SewakSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/ZhouTLZ21,
  author       = {Lina Zhou and
                  Jie Tao and
                  Evan Lai and
                  Dongsong Zhang},
  title        = {Do Fake News Between Different Languages Talk Alike? {A} Case Study
                  of {COVID-19} Related Fake News},
  booktitle    = {{SKM}},
  pages        = {186--199},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97532-6\_11},
  doi          = {10.1007/978-3-030-97532-6\_11},
  timestamp    = {Thu, 03 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/ZhouTLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics