Search dblp for Publications

export results for "toc:db/conf/acsac/acsac2002.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acsac/AdelsteinSK02,
  author       = {Frank Adelstein and
                  Matthew Stillerman and
                  Dexter Kozen},
  title        = {Malicious Code Detection for Open Firmware},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {403--412},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176312},
  doi          = {10.1109/CSAC.2002.1176312},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AdelsteinSK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Al-KahtaniS02,
  author       = {Mohammad A. Al{-}Kahtani and
                  Ravi S. Sandhu},
  title        = {A Model for Attribute-Based User-Role Assignment},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {353--362},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176307},
  doi          = {10.1109/CSAC.2002.1176307},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Al-KahtaniS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AuraRA02,
  author       = {Tuomas Aura and
                  Michael Roe and
                  Jari Arkko},
  title        = {Security of Internet Location Management},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {78--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176281},
  doi          = {10.1109/CSAC.2002.1176281},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AuraRA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BarbieriBR02,
  author       = {Roberto Barbieri and
                  Danilo Bruschi and
                  Emilia Rosti},
  title        = {Voice over IPsec: Analysis and Solutions},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {261--270},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176297},
  doi          = {10.1109/CSAC.2002.1176297},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BarbieriBR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BuchholzDEGGKNSS02,
  author       = {Florian P. Buchholz and
                  Thomas E. Daniels and
                  James P. Early and
                  Rajeev Gopalakrishna and
                  R. Patrick Gorman and
                  Benjamin A. Kuperman and
                  Sofie Nystrom and
                  Addam Schroll and
                  Andrew Smith},
  title        = {Digging For Worms, Fishing For Answers},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {219--226},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176293},
  doi          = {10.1109/CSAC.2002.1176293},
  timestamp    = {Wed, 11 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BuchholzDEGGKNSS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Clifford02,
  author       = {Michael Clifford},
  title        = {Networking in The Solar Trust Model: Determining Optimal Trust Paths
                  in a Decentralized Trust Network},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {271--281},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176298},
  doi          = {10.1109/CSAC.2002.1176298},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Clifford02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CorneyVAM02,
  author       = {Malcolm Corney and
                  Olivier Y. de Vel and
                  Alison Anderson and
                  George M. Mohay},
  title        = {Gender-Preferential Text Mining of E-mail Discourse},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {282--289},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176299},
  doi          = {10.1109/CSAC.2002.1176299},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CorneyVAM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CovingtonFZA02,
  author       = {Michael J. Covington and
                  Prahlad Fogla and
                  Zhiyuan Zhan and
                  Mustaque Ahamad},
  title        = {A Context-Aware Security Architecture for Emerging Applications},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {249--258},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176296},
  doi          = {10.1109/CSAC.2002.1176296},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CovingtonFZA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DouceurABBY02,
  author       = {John R. Douceur and
                  Atul Adya and
                  Josh Benaloh and
                  William J. Bolosky and
                  Gideon Yuval},
  title        = {A Secure Directory Service based on Exclusive Encryption},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {172--182},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176289},
  doi          = {10.1109/CSAC.2002.1176289},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DouceurABBY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GassendCDD02,
  author       = {Blaise Gassend and
                  Dwaine E. Clarke and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Controlled Physical Random Functions},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {149--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176287},
  doi          = {10.1109/CSAC.2002.1176287},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GassendCDD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GeerH02,
  author       = {Daniel E. Geer Jr. and
                  John Harthorne},
  title        = {Penetration Testing: {A} Duet},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {185--195},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176290},
  doi          = {10.1109/CSAC.2002.1176290},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GeerH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HaggertySM02,
  author       = {John Haggerty and
                  Qi Shi and
                  Madjid Merabti},
  title        = {Beyond the Perimeter: the Need for Early Detection of Denial of Service
                  Attacks},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {413--422},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176313},
  doi          = {10.1109/CSAC.2002.1176313},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HaggertySM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HybertsonRCK02,
  author       = {Duane Hybertson and
                  A. Reedy and
                  S. Chapin and
                  M. Kirwan Jr.},
  title        = {Enterprise Engineering And Security: Enterprise Frameworks and Architectures,
                  and {IA} Patterns},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {293--296},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ACSAC.2002.10000},
  doi          = {10.1109/ACSAC.2002.10000},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HybertsonRCK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Johnson02,
  author       = {Dale M. Johnson},
  title        = {Wireless Security: Vulnerabilities and Countermeasures},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {91},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176282},
  doi          = {10.1109/CSAC.2002.1176282},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Johnson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KargerS02,
  author       = {Paul A. Karger and
                  Roger R. Schell},
  title        = {Thirty Years Later: Lessons from the Multics Security Evaluation},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {119--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176285},
  doi          = {10.1109/CSAC.2002.1176285},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KargerS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Kemmerer02,
  author       = {Richard A. Kemmerer},
  title        = {A Practical Approach to Identifying Storage and Timing Channels: Twenty
                  Years Later},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {109--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176284},
  doi          = {10.1109/CSAC.2002.1176284},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Kemmerer02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Kern02,
  author       = {Axel Kern},
  title        = {Advanced Features for Enterprise-Wide Role-Based Access Control},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {333--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176305},
  doi          = {10.1109/CSAC.2002.1176305},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Kern02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Langweg02,
  author       = {Hanno Langweg},
  title        = {With Gaming Technology towards Secure User Interfaces},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {44--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176277},
  doi          = {10.1109/CSAC.2002.1176277},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Langweg02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LeeRKL02,
  author       = {Dustin Lee and
                  Jeff Rowe and
                  Calvin Ko and
                  Karl N. Levitt},
  title        = {Detecting and Defending against Web-Server Fingerprinting},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {321--330},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176304},
  doi          = {10.1109/CSAC.2002.1176304},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LeeRKL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LeitoldHP02,
  author       = {Herbert Leitold and
                  Arno Hollosi and
                  Reinhard Posch},
  title        = {Security Architecture of the Austrian Citizen Card Concept},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {391--400},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176311},
  doi          = {10.1109/CSAC.2002.1176311},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LeitoldHP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Levitt02,
  author       = {Karl N. Levitt},
  title        = {Intrusion Detection: Current Capabilities and Future Directions},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {365--367},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176308},
  doi          = {10.1109/CSAC.2002.1176308},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Levitt02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Liu02,
  author       = {Peng Liu},
  title        = {Architectures for Intrusion Tolerant Database Systems},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {311--320},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176303},
  doi          = {10.1109/CSAC.2002.1176303},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Liu02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Marshall02,
  author       = {Andrew D. Marshall},
  title        = {A Financial Institution's Legacy Mainframe Access Control System in
                  Light of the Proposed {NIST} {RBAC} Standard},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {382--390},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176310},
  doi          = {10.1109/CSAC.2002.1176310},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Marshall02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PopescuST02,
  author       = {Bogdan C. Popescu and
                  Maarten van Steen and
                  Andrew S. Tanenbaum},
  title        = {A Security Architecture for Object-Based Distributed Systems},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {161--171},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176288},
  doi          = {10.1109/CSAC.2002.1176288},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PopescuST02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ProbstEW02,
  author       = {Stefan Probst and
                  Wolfgang E{\ss}mayr and
                  Edgar R. Weippl},
  title        = {Reusable Components for Developing Security-Aware Application},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {239--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176295},
  doi          = {10.1109/CSAC.2002.1176295},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ProbstEW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RitcheyON02,
  author       = {Ronald W. Ritchey and
                  Brian O'Berry and
                  Steven Noel},
  title        = {Representing {TCP/IP} Connectivity For Topological Analysis of Network
                  Security},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {25--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176275},
  doi          = {10.1109/CSAC.2002.1176275},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RitcheyON02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SampemaneNC02,
  author       = {Geetanjali Sampemane and
                  Prasad Naldurg and
                  Roy H. Campbell},
  title        = {Access Control for Active Spaces},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {343--352},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176306},
  doi          = {10.1109/CSAC.2002.1176306},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SampemaneNC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Saydjari02,
  author       = {O. Sami Saydjari},
  title        = {{LOCK} : An Historical Perspective},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {96--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176283},
  doi          = {10.1109/CSAC.2002.1176283},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Saydjari02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchaadM02,
  author       = {Andreas Schaad and
                  Jonathan D. Moffett},
  title        = {A Framework for Organisational Control Principles},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {229--238},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176294},
  doi          = {10.1109/CSAC.2002.1176294},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchaadM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchmidHG02,
  author       = {Matthew Schmid and
                  Frank Hill and
                  Anup K. Ghosh},
  title        = {Protecting Data from Malicious Software},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {199--208},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176291},
  doi          = {10.1109/CSAC.2002.1176291},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchmidHG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ScottD02,
  author       = {Kevin Scott and
                  Jack W. Davidson},
  title        = {Safe Virtual Execution Using Software Dynamic Translation},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {209--218},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176292},
  doi          = {10.1109/CSAC.2002.1176292},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ScottD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SerbanS02,
  author       = {Cristina Serban and
                  O. Sami Saydjari},
  title        = {Themes and Highlights of the New Security Paradigms Workshop 2002},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {297--298},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176301},
  doi          = {10.1109/CSAC.2002.1176301},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/SerbanS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TothK02,
  author       = {Thomas Toth and
                  Christopher Kr{\"{u}}gel},
  title        = {Evaluating the Impact of Automated Intrusion Response Mechanisms},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {301--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176302},
  doi          = {10.1109/CSAC.2002.1176302},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TothK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Ungureanu02,
  author       = {Victoria Ungureanu},
  title        = {Regulating E-Commerce through Certified Contracts},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {35--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176276},
  doi          = {10.1109/CSAC.2002.1176276},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Ungureanu02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VignaVZK02,
  author       = {Giovanni Vigna and
                  Fredrik Valeur and
                  Jingyu Zhou and
                  Richard A. Kemmerer},
  title        = {Composable Tools For Network Discovery and Security Analysis},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {14--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176274},
  doi          = {10.1109/CSAC.2002.1176274},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/VignaVZK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Waldvogel02,
  author       = {Marcel Waldvogel},
  title        = {{GOSSIB} vs. {IP} Traceback Rumors},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {5--13},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176273},
  doi          = {10.1109/CSAC.2002.1176273},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Waldvogel02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeberSSG02,
  author       = {Michael Weber and
                  Matthew Schmid and
                  Michael Schatz and
                  David Geyer},
  title        = {A Toolkit for Detecting and Analyzing Malicious Software},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {423--431},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176314},
  doi          = {10.1109/CSAC.2002.1176314},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WeberSSG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Williamson02,
  author       = {Matthew M. Williamson},
  title        = {Throttling Viruses: Restricting propagation to defeat malicious mobile
                  code},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {61--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176279},
  doi          = {10.1109/CSAC.2002.1176279},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Williamson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XuLS02,
  author       = {Donghua Xu and
                  Chenghuai Lu and
                  Andr{\'{e}} L. M. dos Santos},
  title        = {Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {51--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176278},
  doi          = {10.1109/CSAC.2002.1176278},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XuLS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YuM02,
  author       = {Weijiang Yu and
                  Aloysius K. Mok},
  title        = {Enforcing Resource Bound Safety for Mobile {SNMP} Agents},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {69--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176280},
  doi          = {10.1109/CSAC.2002.1176280},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YuM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZurkoKSB02,
  author       = {Mary Ellen Zurko and
                  Charlie Kaufman and
                  Katherine Spanbauer and
                  Chuck Bassett},
  title        = {Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced
                  With {A} Security Decision},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {371--381},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176309},
  doi          = {10.1109/CSAC.2002.1176309},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZurkoKSB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2002,
  title        = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8386/proceeding},
  isbn         = {0-7695-1828-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}