default search action
Search dblp for Publications
export results for "toc:db/conf/IEEEares/cd-ares2014.bht:"
@inproceedings{DBLP:conf/IEEEares/AlebrahimH14, author = {Azadeh Alebrahim and Maritta Heisel}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Towards Developing Secure Software Using Problem-Oriented Security Patterns}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {45--62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_4}, doi = {10.1007/978-3-319-10975-6\_4}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AlebrahimH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BalanLS14, author = {Sergiu I. Balan and Gianfranco Lamperti and Michele Scandale}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Metrics-Based Incremental Determinization of Finite Automata}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {29--44}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_3}, doi = {10.1007/978-3-319-10975-6\_3}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BalanLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Boehmer14, author = {Wolfgang Boehmer}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Towards Analysis of Sophisticated Attacks, with Conditional Probability, Genetic Algorithm and a Crime Function}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {250--256}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_19}, doi = {10.1007/978-3-319-10975-6\_19}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Boehmer14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CanforaMMV14, author = {Gerardo Canfora and Eric Medvet and Francesco Mercaldo and Corrado Aaron Visaggio}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Detection of Malicious Web Pages Using System Calls Sequences}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {226--238}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_17}, doi = {10.1007/978-3-319-10975-6\_17}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/CanforaMMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Coetzee14, author = {Marijke Coetzee}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Argumentation-Based Group Decision Support for Collectivist Communities}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {1--16}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_1}, doi = {10.1007/978-3-319-10975-6\_1}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Coetzee14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ColellaC14, author = {Antonio Colella and Clara Maria Colombini}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Amplification DDoS Attacks: Emerging Threats and Defense Strategies}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {298--310}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_24}, doi = {10.1007/978-3-319-10975-6\_24}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ColellaC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DesnitskyK14, author = {Vasily Desnitsky and Igor V. Kotenko}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {194--210}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_15}, doi = {10.1007/978-3-319-10975-6\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/DesnitskyK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HavingaS14, author = {Hellen Nanda Janine Havinga and Olivier Diederik Theobald Sessink}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Risk Reduction Overview - {A} Visualization Method for Risk Management}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {239--249}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_18}, doi = {10.1007/978-3-319-10975-6\_18}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HavingaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HeZLSY14, author = {Qian He and Baokang Zhao and Yunjian Long and Jinshu Su and Ilsun You}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {A Structure {P2P} Based Web Services Registry with Access and Control}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {286--297}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_23}, doi = {10.1007/978-3-319-10975-6\_23}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HeZLSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HolzingerSOJVRZ14, author = {Andreas Holzinger and Michael Schwarz and Bernhard Ofner and Fleur Jeanquartier and Andr{\'{e}} Calero Valdez and Carsten R{\"{o}}cker and Martina Ziefle}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Towards Interactive Visualization of Longitudinal Data to Support Knowledge Discovery on Multi-touch Tablet Computers}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {124--137}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_9}, doi = {10.1007/978-3-319-10975-6\_9}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HolzingerSOJVRZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HolzingerSSJZDLVRZ14, author = {Andreas Holzinger and Bettina Sommerauer and Peter Spitzer and Simon Juric and Borut Zalik and Matjaz Debevc and Chantal Lidynia and Andr{\'{e}} Calero Valdez and Carsten R{\"{o}}cker and Martina Ziefle}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Mobile Computing is not Always Advantageous: Lessons Learned from a Real-World Case Study in a Hospital}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {110--123}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_8}, doi = {10.1007/978-3-319-10975-6\_8}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HolzingerSSJZDLVRZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HuangLYY14, author = {Yi{-}Li Huang and Fang{-}Yie Leu and Ilsun You and Jing{-}Hao Yang}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {166--171}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_12}, doi = {10.1007/978-3-319-10975-6\_12}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HuangLYY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Jara14, author = {Antonio J. Jara}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Trust Extension Protocol for Authentication in Networks Oriented to Management {(TEPANOM)}}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {155--165}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_11}, doi = {10.1007/978-3-319-10975-6\_11}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Jara14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KiyomotoM14, author = {Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {PrivacyFrost2: {A} Efficient Data Anonymization Tool Based on Scoring Functions}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {211--225}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_16}, doi = {10.1007/978-3-319-10975-6\_16}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MunanteCGA14, author = {Denisse Mu{\~{n}}ante and Vanea Chiprianov and Laurent Gallon and Philippe Aniort{\'{e}}}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {A Review of Security Requirements Engineering Methods with Respect to Risk Analysis and Model-Driven Engineering}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {79--93}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_6}, doi = {10.1007/978-3-319-10975-6\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MunanteCGA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/NovikovaK14, author = {Evgenia Novikova and Igor V. Kotenko}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {63--78}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_5}, doi = {10.1007/978-3-319-10975-6\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/NovikovaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/OgielaOO14, author = {Marek R. Ogiela and Lidia Ogiela and Urszula Ogiela}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Crypto-Biometric Models for Information Secrecy}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {172--178}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_13}, doi = {10.1007/978-3-319-10975-6\_13}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/OgielaOO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PlateauxLJR14, author = {Aude Plateaux and Patrick Lacharme and Audun J{\o}sang and Christophe Rosenberger}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {One-Time Biometrics for Online Banking and Electronic Payment Authentication}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {179--193}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_14}, doi = {10.1007/978-3-319-10975-6\_14}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PlateauxLJR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SongZP14, author = {Jingping Song and Zhiliang Zhu and Chris J. Price}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Feature Grouping for Intrusion Detection System Based on Hierarchical Clustering}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {270--280}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_21}, doi = {10.1007/978-3-319-10975-6\_21}, timestamp = {Sat, 18 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SongZP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/VoAT14, author = {Sao{-}Khue Vo and Amin Anjomshoaa and A Min Tjoa}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Semantic-Aware Mashups for Personal Resources in SemanticLIFE and SocialLIFE}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {138--154}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_10}, doi = {10.1007/978-3-319-10975-6\_10}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/VoAT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Wohlgemuth14, author = {Sven Wohlgemuth}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Adaptive User-Centered Security}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {94--109}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_7}, doi = {10.1007/978-3-319-10975-6\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Wohlgemuth14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Yamamoto14, author = {Shuichiro Yamamoto}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {A Knowledge Integration Approach for Safety-Critical Software Development and Operation Based on the Method Architecture}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {17--28}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_2}, doi = {10.1007/978-3-319-10975-6\_2}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Yamamoto14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ZhaoCZYSY14, author = {Guohong Zhao and Shuhui Chen and Baokang Zhao and Ilsun You and Jinshu Su and Wanrong Yu}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {A High-Speed Network Content Filtering System}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {257--269}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_20}, doi = {10.1007/978-3-319-10975-6\_20}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ZhaoCZYSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ZhaoYZW14, author = {Guohong Zhao and Wanrong Yu and Baokang Zhao and Chunqing Wu}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Towards a Key Consuming Detection in QKD-VoIP Systems}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {281--285}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_22}, doi = {10.1007/978-3-319-10975-6\_22}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ZhaoYZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/IEEEares/2014cd, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6}, doi = {10.1007/978-3-319-10975-6}, isbn = {978-3-319-10974-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/2014cd.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.