Search dblp for Publications

export results for "toc:db/conf/IEEEares/cd-ares2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/IEEEares/AlebrahimH14,
  author       = {Azadeh Alebrahim and
                  Maritta Heisel},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Towards Developing Secure Software Using Problem-Oriented Security
                  Patterns},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {45--62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_4},
  doi          = {10.1007/978-3-319-10975-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AlebrahimH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BalanLS14,
  author       = {Sergiu I. Balan and
                  Gianfranco Lamperti and
                  Michele Scandale},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Metrics-Based Incremental Determinization of Finite Automata},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_3},
  doi          = {10.1007/978-3-319-10975-6\_3},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BalanLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Boehmer14,
  author       = {Wolfgang Boehmer},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Towards Analysis of Sophisticated Attacks, with Conditional Probability,
                  Genetic Algorithm and a Crime Function},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {250--256},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_19},
  doi          = {10.1007/978-3-319-10975-6\_19},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Boehmer14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CanforaMMV14,
  author       = {Gerardo Canfora and
                  Eric Medvet and
                  Francesco Mercaldo and
                  Corrado Aaron Visaggio},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Detection of Malicious Web Pages Using System Calls Sequences},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {226--238},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_17},
  doi          = {10.1007/978-3-319-10975-6\_17},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CanforaMMV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Coetzee14,
  author       = {Marijke Coetzee},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Argumentation-Based Group Decision Support for Collectivist Communities},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_1},
  doi          = {10.1007/978-3-319-10975-6\_1},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Coetzee14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ColellaC14,
  author       = {Antonio Colella and
                  Clara Maria Colombini},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Amplification DDoS Attacks: Emerging Threats and Defense Strategies},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {298--310},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_24},
  doi          = {10.1007/978-3-319-10975-6\_24},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ColellaC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DesnitskyK14,
  author       = {Vasily Desnitsky and
                  Igor V. Kotenko},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Expert Knowledge Based Design and Verification of Secure Systems with
                  Embedded Devices},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {194--210},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_15},
  doi          = {10.1007/978-3-319-10975-6\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DesnitskyK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HavingaS14,
  author       = {Hellen Nanda Janine Havinga and
                  Olivier Diederik Theobald Sessink},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Risk Reduction Overview - {A} Visualization Method for Risk Management},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {239--249},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_18},
  doi          = {10.1007/978-3-319-10975-6\_18},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HavingaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HeZLSY14,
  author       = {Qian He and
                  Baokang Zhao and
                  Yunjian Long and
                  Jinshu Su and
                  Ilsun You},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {A Structure {P2P} Based Web Services Registry with Access and Control},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {286--297},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_23},
  doi          = {10.1007/978-3-319-10975-6\_23},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HeZLSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HolzingerSOJVRZ14,
  author       = {Andreas Holzinger and
                  Michael Schwarz and
                  Bernhard Ofner and
                  Fleur Jeanquartier and
                  Andr{\'{e}} Calero Valdez and
                  Carsten R{\"{o}}cker and
                  Martina Ziefle},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Towards Interactive Visualization of Longitudinal Data to Support
                  Knowledge Discovery on Multi-touch Tablet Computers},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {124--137},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_9},
  doi          = {10.1007/978-3-319-10975-6\_9},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HolzingerSOJVRZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HolzingerSSJZDLVRZ14,
  author       = {Andreas Holzinger and
                  Bettina Sommerauer and
                  Peter Spitzer and
                  Simon Juric and
                  Borut Zalik and
                  Matjaz Debevc and
                  Chantal Lidynia and
                  Andr{\'{e}} Calero Valdez and
                  Carsten R{\"{o}}cker and
                  Martina Ziefle},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Mobile Computing is not Always Advantageous: Lessons Learned from
                  a Real-World Case Study in a Hospital},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {110--123},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_8},
  doi          = {10.1007/978-3-319-10975-6\_8},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HolzingerSSJZDLVRZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HuangLYY14,
  author       = {Yi{-}Li Huang and
                  Fang{-}Yie Leu and
                  Ilsun You and
                  Jing{-}Hao Yang},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Building an Initialization Cipher Block with Two-Dimensional Operation
                  and Random Parameters},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {166--171},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_12},
  doi          = {10.1007/978-3-319-10975-6\_12},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HuangLYY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Jara14,
  author       = {Antonio J. Jara},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Trust Extension Protocol for Authentication in Networks Oriented to
                  Management {(TEPANOM)}},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {155--165},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_11},
  doi          = {10.1007/978-3-319-10975-6\_11},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Jara14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KiyomotoM14,
  author       = {Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {PrivacyFrost2: {A} Efficient Data Anonymization Tool Based on Scoring
                  Functions},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {211--225},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_16},
  doi          = {10.1007/978-3-319-10975-6\_16},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KiyomotoM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MunanteCGA14,
  author       = {Denisse Mu{\~{n}}ante and
                  Vanea Chiprianov and
                  Laurent Gallon and
                  Philippe Aniort{\'{e}}},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {A Review of Security Requirements Engineering Methods with Respect
                  to Risk Analysis and Model-Driven Engineering},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {79--93},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_6},
  doi          = {10.1007/978-3-319-10975-6\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MunanteCGA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/NovikovaK14,
  author       = {Evgenia Novikova and
                  Igor V. Kotenko},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Visual Analytics for Detecting Anomalous Activity in Mobile Money
                  Transfer Services},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_5},
  doi          = {10.1007/978-3-319-10975-6\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/NovikovaK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/OgielaOO14,
  author       = {Marek R. Ogiela and
                  Lidia Ogiela and
                  Urszula Ogiela},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Crypto-Biometric Models for Information Secrecy},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {172--178},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_13},
  doi          = {10.1007/978-3-319-10975-6\_13},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/OgielaOO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PlateauxLJR14,
  author       = {Aude Plateaux and
                  Patrick Lacharme and
                  Audun J{\o}sang and
                  Christophe Rosenberger},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {One-Time Biometrics for Online Banking and Electronic Payment Authentication},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {179--193},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_14},
  doi          = {10.1007/978-3-319-10975-6\_14},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PlateauxLJR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SongZP14,
  author       = {Jingping Song and
                  Zhiliang Zhu and
                  Chris J. Price},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Feature Grouping for Intrusion Detection System Based on Hierarchical
                  Clustering},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {270--280},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_21},
  doi          = {10.1007/978-3-319-10975-6\_21},
  timestamp    = {Sat, 18 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SongZP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/VoAT14,
  author       = {Sao{-}Khue Vo and
                  Amin Anjomshoaa and
                  A Min Tjoa},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Semantic-Aware Mashups for Personal Resources in SemanticLIFE and
                  SocialLIFE},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {138--154},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_10},
  doi          = {10.1007/978-3-319-10975-6\_10},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/VoAT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Wohlgemuth14,
  author       = {Sven Wohlgemuth},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Adaptive User-Centered Security},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {94--109},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_7},
  doi          = {10.1007/978-3-319-10975-6\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Wohlgemuth14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Yamamoto14,
  author       = {Shuichiro Yamamoto},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {A Knowledge Integration Approach for Safety-Critical Software Development
                  and Operation Based on the Method Architecture},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {17--28},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_2},
  doi          = {10.1007/978-3-319-10975-6\_2},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Yamamoto14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ZhaoCZYSY14,
  author       = {Guohong Zhao and
                  Shuhui Chen and
                  Baokang Zhao and
                  Ilsun You and
                  Jinshu Su and
                  Wanrong Yu},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {A High-Speed Network Content Filtering System},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {257--269},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_20},
  doi          = {10.1007/978-3-319-10975-6\_20},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ZhaoCZYSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ZhaoYZW14,
  author       = {Guohong Zhao and
                  Wanrong Yu and
                  Baokang Zhao and
                  Chunqing Wu},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Towards a Key Consuming Detection in QKD-VoIP Systems},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {281--285},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_22},
  doi          = {10.1007/978-3-319-10975-6\_22},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ZhaoYZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2014cd,
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6},
  doi          = {10.1007/978-3-319-10975-6},
  isbn         = {978-3-319-10974-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/2014cd.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}