default search action
Search dblp for Publications
export results for "toc:db/conf/eisa/eisa2021.bht:"
@proceedings{DBLP:conf/eisa/2021, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-93956-4}, doi = {10.1007/978-3-030-93956-4}, isbn = {978-3-030-93955-7}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/0001FO21, author = {Muhammad Imran Khan and Simon N. Foley and Barry O'Sullivan}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - {A} Brief Survey of Concepts and Approaches}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {178--197}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_11}, doi = {10.1007/978-3-030-93956-4\_11}, timestamp = {Wed, 02 Mar 2022 16:47:49 +0100}, biburl = {https://dblp.org/rec/conf/eisa/0001FO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/0002KR21, author = {Martin Grimmer and Tim Kaelble and Erhard Rahm}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {Improving Host-Based Intrusion Detection Using Thread Information}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {159--177}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_10}, doi = {10.1007/978-3-030-93956-4\_10}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/0002KR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/GreavesCL21, author = {Brian Greaves and Marijke Coetzee and Wai Sze Leung}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {Digital Twin Monitoring for Cyber-Physical Access Control}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {144--158}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_9}, doi = {10.1007/978-3-030-93956-4\_9}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/GreavesCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/GuptaKNG21, author = {Sanonda Datta Gupta and Stephen Kaplan and Aubree Nygaard and Sepideh Ghanavati}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {A Two-Fold Study to Investigate Users' Perception of IoT Information Sensitivity Levels and Their Willingness to Share the Information}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {87--107}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_6}, doi = {10.1007/978-3-030-93956-4\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/GuptaKNG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/HeC21, author = {Yueyue He and Jiageng Chen}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {AMLChain: Supporting Anti-money Laundering, Privacy-Preserving, Auditable Distributed Ledger}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {50--67}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_4}, doi = {10.1007/978-3-030-93956-4\_4}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/HeC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/JingYH21, author = {Pujie Jing and Shixiong Yao and Yueyue He}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {{APHC:} Auditable and Privacy Preserving Health {QR} Code Based on Blockchain}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {36--49}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_3}, doi = {10.1007/978-3-030-93956-4\_3}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/JingYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/Lyu0ZYHH21, author = {Ting Lyu and Liang Liu and Fangzhou Zhu and Jingxiu Yang and Simin Hu and Yanxi Huang}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {{NEEX:} An Automated and Efficient Tool for Detecting Browser Extension Fingerprint}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {21--35}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_2}, doi = {10.1007/978-3-030-93956-4\_2}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/Lyu0ZYHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/ShresthaITD21, author = {Sunny Shrestha and Esa Irby and Raghav Thapa and Sanchari Das}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {SoK: {A} Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {108--127}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_7}, doi = {10.1007/978-3-030-93956-4\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/ShresthaITD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/YeLHZYW21, author = {Renjun Ye and Liang Liu and Simin Hu and Fangzhou Zhu and Jingxiu Yang and Feng Wang}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {{JSLIM:} Reducing the Known Vulnerabilities of JavaScript Application by Debloating}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {128--143}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_8}, doi = {10.1007/978-3-030-93956-4\_8}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/YeLHZYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/ZhangC21, author = {Jixin Zhang and Jiageng Chen}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {Practical and Provable Secure Vehicular Component Protection Scheme}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {1--20}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_1}, doi = {10.1007/978-3-030-93956-4\_1}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/ZhangC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/ZhangGMT21, author = {Boyun Zhang and Puneet Gill and Nelu Mihai and Mahesh Tripunitara}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {Granularity and Usability in Authorization Policies}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {68--86}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_5}, doi = {10.1007/978-3-030-93956-4\_5}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/ZhangGMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.