The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "HotSoS"( http://dblp.L3S.de/Venues/HotSoS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/hotsos

Publication years (Num. hits)
2014 (36) 2015 (29) 2016 (27) 2017-2018 (41) 2019 (28) 2020 (31)
Publication types (Num. hits)
inproceedings(185) proceedings(7)
Venues (Conferences, Journals, ...)
HotSoS(192)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 192 publication records. Showing 192 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ryan Gabrys, Luis Martinez, Sunny Fugate How to swap instructions midstream: an embedding algorithm for program steganography. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Md. Rayhanur Rahman, William Enck, Laurie A. Williams Do configuration management tools make systems more secure?: an empirical research plan. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Andrew Arnold, Paul Corapi, Michael Nasta, Kevin Wolgast, Thomas A. Babbitt A raspberry Pi sensor network for wildlife conservation. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ira Ray Jenkins, Prashant Anantharaman, Rebecca Shapiro, J. Peter Brady, Sergey Bratus, Sean W. Smith Ghostbusting: mitigating spectre with intraprocess memory isolation. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Aidan McCarthy, Liam Furey, Keagan Smith, Daniel Hawthorne, Raymond W. Blaine Application of the armament cyber assessment framework: a security assessment methodology for military systems. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Farzana Ahamed Bhuiyan, Raunak Shakya, Akond Rahman Can we use software bug reports to identify vulnerability discovery strategies? Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Khir Henderson, Kevin T. Kornegay Improving architectures for automating network security using specification-based protocols. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Li Li, Proyash Podder, Md. Endadul Hoque A formal security analysis of ZigBee (1.0 and 3.0). Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hoang Hai Nguyen An uncertain graph-based approach for cyber-security risk assessment. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kaushik Ayinala, Baek-Young Choi, Sejun Song Accelerating block propagation in PoW blockchain networks with pipelining and chunking. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Grant Jurgensen, Michael Neises, Perry Alexander An seL4-based architecture for layered attestation. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Adam Petz An infrastructure for faithful execution of remote attestation protocols. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jairo Giraldo, David I. Urbina, Chee Yee Tang, Alvaro A. Cárdenas The more the merrier: adding hidden measurements to secure industrial control systems. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Conor Gilsenan, Noura Alomar, Andrew Huang, Serge Egelman Decentralized backup and recovery of TOTP secrets. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sarah Michele Rajtmajer, Daniel Susser Automated influence and the challenge of cognitive security. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Justin Murphy, Elias T. Brady, Md. Shazibul Islam Shamim, Akond Rahman A curated dataset of security defects in scientific software projects. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Perry Alexander, Drew Davidson, Baek-Young Choi (eds.) Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2020, Lawrence, Kansas, USA, September 22-24, 2020 Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Olufogorehan Tunde-Onadele, Yuhang Lin, Jingzhu He, Xiaohui Gu Toward just-in-time patching for containerized applications. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sohaib Kiani, Sana Awan, Jun Huan, Fengjun Li, Bo Luo WOLF: automated machine learning workflow management framework for malware detection and other applications. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Qais Tasali, Nikesh Gyawali, Eugene Y. Vasserman Time series anomaly detection in medical break-the-glass. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nancy Mogire Tokens of interaction: psycho-physiological signals, a potential source of evidence of digital incidents. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Michael Garrett Bechtel, Heechul Yun Exploiting DRAM bank mapping and HugePages for effective denial-of-service attacks on shared cache in multicore. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Raunak Shakya, Akond Rahman A preliminary taxonomy of techniques used in software fuzzing. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chandra Sharma, Nathan Miller, George T. Amariucai Neutralizing manipulation of critical data by enforcing data-instruction dependency. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Eric D. Vugrin, Jerry Cruz, Christian Reedy, Thomas D. Tarman, Ali Pinar Cyber threat modeling and validation: port scanning and detection. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Himanshu Neema, Xenofon D. Koutsoukos, Bradley Potteiger, Chee Yee Tang, Keith Stouffer Simulation testbed for railway infrastructure security and resilience evaluation. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ali Irmak Ozdagli, Carlos A. Barreto, Xenofon D. Koutsoukos @PAD: adversarial training of power systems against denial-of-service attacks. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lauren Elizabeth Provost, Rebecca Labitt, Danielle Alexandre, Asher Rodriguez Approaches to ethical hacking: expanding conceptual frameworks for research. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jiani Li, Waseem Abbas, Mudassir Shabbir, Xenofon D. Koutsoukos Resilient multi-robot target pursuit. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mohammad Aref Al-Ramahi, Izzat Alsmadi, Joshua Davenport Exploring hackers assets: topics of interest as indicators of compromise. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Bradley Potteiger, Jacob Mills, Daniel Cohen, Paul Velez RUCKUS: a cybersecurity engine for performing autonomous cyber-physical system vulnerability discovery at scale. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ghaith Husari, Ehab Al-Shaer, Bill Chu, Ruhani Faiheem Rahman Learning APT chains from cyber threat intelligence. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Adam Petz, Perry Alexander A copland attestation manager. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sebastian Benthall Situated information flow theory. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jairo Giraldo, Alvaro A. Cárdenas A new metric to compare anomaly detection algorithms in cyber-physical systems. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Xue Qin, Robert Neuhaus, Diego Gonzales, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu 0001 Taming web views in the detection of Android privacy leaks. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Xenofon D. Koutsoukos, Alvaro A. Cárdenas, Ehab Al-Shaer (eds.) Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019 Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Muhammad Abdul Basit Ur Rahim, Qi Duan, Ehab Al-Shaer A formal verification of mutation-based moving target defense. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1John Heaps, Xueling Zhang, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu 0001 Toward a reliability measurement framework automated using deep learning. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kimberly Ferguson-Walter, Sunny Fugate, Justin Mauger, Maxine Major Game theory for adaptive defensive cyber deception. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nasif Imtiaz, Laurie A. Williams A synopsis of static analysis alerts on open source software. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Quanyan Zhu Game theory for cyber deception: a tutorial. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Francisco Pipa, John Symons Towards an understanding of resilience with complex networks. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Avesta Hojjati, Yunhui Long, Soteris Demetriou, Carl A. Gunter BEEER: distributed record and replay for medical devices in hospital operating rooms. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Bernhard Garn, Dimitris E. Simos, Stefan Zauner, Rick Kuhn, Raghu Kacker Browser fingerprinting using combinatorial sequence testing. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Daniel Andrews, Jennifer Behn, Danielle Jaksha, Jinwon Seo, Madeleine Schneider, James Yoon, Suzanne J. Matthews, Rajeev Agrawal, Alexander S. Mentis Exploring RNNs for analyzing Zeek HTTP data. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Key-whan Chung, Phuong Cao, Yuming Wu, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Alexander Withers TRACTION: an infrastructure for trusted alert sharing and collaborative mitigation. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Md. Mazharul Islam 0001, Ehab Al-Shaer, Ashutosh Dutta, Mohammed Noraden Alsaleh CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions orchestration. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Suresh K. Damodaran, Paul D. Rowe Limitations on observability of effects in cyber-physical systems. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Himanshu Neema, Harsh Vardhan, Carlos A. Barreto, Xenofon D. Koutsoukos Design and simulation platform for evaluation of grid distribution system and transactive energy. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Bradley Potteiger, Hamzah Abdel-Aziz, Himanshu Neema, Xenofon D. Koutsoukos Simulation based evaluation of security and resilience in railway infrastructure. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Akond Rahman, Laurie A. Williams A bird's eye view of knowledge needs related to penetration testing. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ashutosh Dutta, Ehab Al-Shaer Cyber defense matrix: a new model for optimal composition of cybersecurity controls to construct resilient risk mitigation. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Xingyu Zhou 0010, Yi Li, Carlos A. Barreto, Péter Völgyesi, Xenofon D. Koutsoukos Load forecasting with adversarial attacks in power systems using DeepForge. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohiuddin Ahmed, Ehab Al-Shaer Measures and metrics for the enforcement of critical security controls: a case study of boundary defense. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Brian H. Curtin, Rachelle H. David, Emmet D. Dunham, Cullen D. Johnson, Nikhil Shyamkumar, Thomas A. Babbitt, Suzanne J. Matthews Designing a Raspberry Pi sensor network for remote observation of wildlife. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ryan Brunner, Sang-Keun Oh, Jesse Ramirez, Paul Houck, Nathaniel Stickney, Raymond W. Blaine Design for an educational cyber range. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Bradley Potteiger, Zhenkai Zhang, Xenofon D. Koutsoukos Integrated data space randomization and control reconfiguration for securing cyber-physical systems. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ehsan Aghaei, Ehab Al-Shaer ThreatZoom: neural network for automated vulnerability mitigation. Search on Bibsonomy HotSoS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hui Guo 0002, Özgür Kafali, Anne-Liz Jeukeng, Laurie A. Williams, Munindar P. Singh Toward extraction of security requirements from text: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Leslie Leonard, William Glodek HACSAW: a trusted framework for cyber situational awareness. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Inger Anne Tøndel, Tosin Daniel Oyetoyan, Martin Gilje Jaatun, Daniela S. Cruzes Understanding challenges to adoption of the Microsoft elevation of privilege game. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pooria Madani, Natalija Vlajic Robustness of deep autoencoder in intrusion detection under adversarial contamination. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dimitris E. Simos, Rick Kuhn, Yu Lei 0001, Raghu Kacker Combinatorial security testing course. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lindsey McGowen, Angela Stoica An expert-based bibliometric for a science of security: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniel G. Wolf, Donald L. Goff A ransomware research framework: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martha McNeil, Thomas Llansó, Dallas Pearson Application of capability-based cyber risk assessment methodology to a space system. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bradley Potteiger, Zhenkai Zhang, Xenofon D. Koutsoukos Integrated instruction set randomization and control reconfiguration for securing cyber-physical systems. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ira Ray Jenkins, Sergey Bratus, Sean W. Smith, Maxwell Koo Reinventing the privilege drop: how principled preservation of programmer intent would prevent security bugs. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Iness Ben Guirat, Harry Halpin Formal verification of the W3C web authentication protocol. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Darya Melicher, Yangqingwei Shi, Valerie Zhao, Alex Potanin, Jonathan Aldrich Using object capabilities and effects to build an authority-safe module system: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Erkang Zheng, Phil Gates-Idem, Matt Lavin Building a virtually air-gapped secure environment in AWS: with principles of devops security program and secure software delivery. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Huashan Chen, Jin-Hee Cho, Shouhuai Xu Quantifying the security effectiveness of network diversity: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nikolay Shopov, Mingu Jeong, Evin Rude, Brennan Neseralla, Scott Hutchison, Alexander S. Mentis, Suzanne J. Matthews Investigating tensorflow for airport facial identification: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yao Dong 0001, Ana L. Milanova, Julian Dolby SecureMR: secure mapreduce computation using homomorphic encryption and program partitioning. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Spencer Drakontaidis, Michael Stanchi, Gabriel Glazer, Antoine Davis, Madison Stark, Caleb Clay, Jason Hussey, Nicholas Barry, Aaron St. Leger, Suzanne J. Matthews Integrating historical and real-time anomaly detection to create a more resilient smart grid architecture: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Munindar P. Singh, Laurie A. Williams, Rick Kuhn, Tao Xie 0001 (eds.) Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2018, Raleigh, North Carolina, USA, April 10-11, 2018. Search on Bibsonomy HoTSoS The full citation details ... 2018 DBLP  BibTeX  RDF
1Jayati Dev, Sanchari Das, L. Jean Camp Understanding privacy concerns of whatsapp users in India: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sarah Elder, Anna Mattapallil, Laurie A. Williams A comparative analysis of manual methods for analyzing security requirements in regulatory documents: POSTER. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andrés Alejos, Matthew Ball, Connor Eckert, Michael Ma, Hayden Ward, Peter Hanlon, Suzanne J. Matthews Exploring the raspberry Pi for data summarization in wireless sensor networks: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ryan Wagner, David Garlan, Matt Fredrikson Quantitative underpinnings of secure, graceful degradation: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniela S. Cruzes, Martin Gilje Jaatun, Tosin Daniel Oyetoyan Challenges and approaches of performing canonical action research in software security: research paper. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Katharine Ahrens Cryptography in a post-quantum world: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Muhammad Umer Tariq, Marilyn Wolf Hourglass-shaped architecture for model-based development of safe and secure cyber-physical systems: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Huashan Chen, Jin-Hee Cho, Shouhuai Xu Quantifying the security effectiveness of firewalls and DMZs. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rick Kuhn, Mohammad S. Raunak, Raghu Kacker What proportion of vulnerabilities can be attributed to ordinary coding errors?: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Key-whan Chung, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer Indirect cyber attacks by perturbation of environment control: a data driven attack model: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nirav Ajmeri, Hui Guo 0002, Pradeep K. Murukannaiah, Munindar P. Singh Ethics, values, and personal agents: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Uttam Thakore, Ahmed M. Fawaz, William H. Sanders Detecting monitor compromise using evidential reasoning: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christopher Theisen, Laurie A. Williams How bad is it, really? an analysis of severity scores for vulnerabilities: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hoang Hai Nguyen, Kartik Palani, David M. Nicol An Approach to Incorporating Uncertainty in Network Security Analysis. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ghita Mezzour, Kathleen M. Carley, L. Richard Carley Global Variation in Attack Encounters and Hosting. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Morgan Burcham, Mahran Al-Zyoud, Jeffrey C. Carver, Mohammed Noraden Alsaleh, Hongying Du, Fida Gillani, Jun Jiang, Akond Rahman, Özgür Kafali, Ehab Al-Shaer, Laurie A. Williams Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, Hanover, MD, USA, April 4-5, 2017 Search on Bibsonomy HoTSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Patrick Morrison, Benjamin H. Smith, Laurie A. Williams Surveying Security Practice Adherence in Software Development. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Carlos A. Barreto, Alvaro A. Cárdenas, Alain Bensoussan 0001 Optimal Security Investments in a Prevention and Detection Game. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Weining Yang, Aiping Xiong, Jing Chen 0005, Robert W. Proctor, Ninghui Li Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pradeep K. Murukannaiah, Chinmaya Dabral, Karthik Sheshadri, Esha Sharma, Jessica Staddon Learning a Privacy Incidents Database. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jairo Giraldo, Alvaro A. Cárdenas, Murat Kantarcioglu Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Richeng Jin, Xiaofan He, Huaiyu Dai On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 192 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license