default search action
Search dblp for Publications
export results for "toc:db/conf/icse-encycris/icse-encycris2021.bht:"
@inproceedings{DBLP:conf/icse-encycris/BhuiyanMMR21, author = {Farzana Ahamed Bhuiyan and Justin Murphy and Patrick Morrison and Akond Rahman}, title = {Practitioner Perception of Vulnerability Discovery Strategies}, booktitle = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, pages = {41--44}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021.00014}, doi = {10.1109/ENCYCRIS52570.2021.00014}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/BhuiyanMMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/BoseRS21, author = {Dibyendu Brinto Bose and Akond Rahman and Md. Shazibul Islam Shamim}, title = {'Under-reported' Security Defects in Kubernetes Manifests}, booktitle = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, pages = {9--12}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021.00009}, doi = {10.1109/ENCYCRIS52570.2021.00009}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/BoseRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/MeyerKL21, author = {Torstein Meyer and Nektaria Kaloudi and Jingyue Li}, title = {A Systematic Literature Review on Malicious Use of Reinforcement Learning}, booktitle = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, pages = {21--28}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021.00011}, doi = {10.1109/ENCYCRIS52570.2021.00011}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/MeyerKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/MihretL21, author = {Zelalem Mihret and Lingjun Liu}, title = {Attack-driven Test Case Generation Approach using Model-checking Technique for Collaborating Systems}, booktitle = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021.00008}, doi = {10.1109/ENCYCRIS52570.2021.00008}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/MihretL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/MohamadAJSS21, author = {Mazen Mohamad and {\"{O}}rjan Askerdal and Rodi Jolak and Jan{-}Philipp Stegh{\"{o}}fer and Riccardo Scandariato}, title = {Asset-driven Security Assurance Cases with Built-in Quality Assurance}, booktitle = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, pages = {29--36}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021.00012}, doi = {10.1109/ENCYCRIS52570.2021.00012}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse-encycris/MohamadAJSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/RyanRS21, author = {Ita Ryan and Utz Roedig and Klaas{-}Jan Stol}, title = {Understanding Developer Security Archetypes}, booktitle = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, pages = {37--40}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021.00013}, doi = {10.1109/ENCYCRIS52570.2021.00013}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/RyanRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/SkandylasZKR21, author = {Charilaos Skandylas and Luyuan Zhou and Narges Khakpour and Simon Roe}, title = {Security Risk Analysis of Multi-Stage Attacks based on Data Criticality}, booktitle = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, pages = {13--20}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021.00010}, doi = {10.1109/ENCYCRIS52570.2021.00010}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse-encycris/SkandylasZKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icse-encycris/2021, title = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021}, doi = {10.1109/ENCYCRIS52570.2021}, isbn = {978-1-6654-4553-5}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.