Search dblp for Publications

export results for "toc:db/conf/icssa/icssa2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icssa/Anand16,
  author       = {Priya Anand},
  title        = {Overview of Root Causes of Software Vulnerabilities - Technical and
                  User-Side Perspectives},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {70--74},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.20},
  doi          = {10.1109/ICSSA.2016.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/Anand16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/BragaD16,
  author       = {Alexandre Melo Braga and
                  Ricardo Dahab},
  title        = {Towards a Methodology for the Development of Secure Cryptographic
                  Software},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.12},
  doi          = {10.1109/ICSSA.2016.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/BragaD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/BuhovTS16,
  author       = {Damjan Buhov and
                  Richard Thron and
                  Sebastian Schrittwieser},
  title        = {Catch Me if You Can! Transparent Detection of Shellcode},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {60--63},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.18},
  doi          = {10.1109/ICSSA.2016.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/BuhovTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/ChoiL16,
  author       = {Su Yeon Choi and
                  Hae Young Lee},
  title        = {Toward Automated Scanning for Code Injection Vulnerabilities in HTML5-Based
                  Mobile Apps},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {24},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.11},
  doi          = {10.1109/ICSSA.2016.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/ChoiL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/EignerKT16,
  author       = {Oliver Eigner and
                  Philipp Kreimel and
                  Paul Tavolato},
  title        = {Detection of Man-in-the-Middle Attacks on Industrial Control Networks},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {64--69},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.19},
  doi          = {10.1109/ICSSA.2016.19},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/EignerKT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/KhanI16,
  author       = {Naurin Farooq Khan and
                  Naveed Ikram},
  title        = {Security Requirements Engineering: {A} Systematic Mapping {(2010-2015)}},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {31--36},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.13},
  doi          = {10.1109/ICSSA.2016.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/KhanI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/KoivunenRL16,
  author       = {Lauri Koivunen and
                  Sampsa Rauti and
                  Ville Lepp{\"{a}}nen},
  title        = {Applying Internal Interface Diversification to IoT Operating Systems},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.7},
  doi          = {10.1109/ICSSA.2016.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/KoivunenRL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/LeeKKK16,
  author       = {Sora Lee and
                  Jinwoo Kim and
                  Sangjun Ko and
                  Hyoungshick Kim},
  title        = {A Security Analysis of Paid Subscription Video-on-Demand Services
                  for Online Learning},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {43--48},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.15},
  doi          = {10.1109/ICSSA.2016.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/LeeKKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/PirkerN16,
  author       = {Martin Pirker and
                  Andreas Nusser},
  title        = {Assessment of Server State via Inter-Clone Differences},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {54--59},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.17},
  doi          = {10.1109/ICSSA.2016.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/PirkerN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/SerovL16,
  author       = {Igor Serov and
                  Maria Leitner},
  title        = {An Experimental Approach to Reputation in E-Participation},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {37--42},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.14},
  doi          = {10.1109/ICSSA.2016.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/SerovL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/TemperT16,
  author       = {Marlies Temper and
                  Simon Tjoa},
  title        = {The Applicability of Fuzzy Rough Classifier for Continuous Person
                  Authentication},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {17--23},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.10},
  doi          = {10.1109/ICSSA.2016.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/TemperT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/WegererT16,
  author       = {Mathias Wegerer and
                  Simon Tjoa},
  title        = {Defeating the Database Adversary Using Deception - {A} MySQL Database
                  Honeypot},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {6--10},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.8},
  doi          = {10.1109/ICSSA.2016.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/WegererT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/Wotawa16,
  author       = {Franz Wotawa},
  title        = {On the Automation of Security Testing},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {11--16},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.9},
  doi          = {10.1109/ICSSA.2016.9},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/Wotawa16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/YoonKKL16,
  author       = {Ji{-}Hyeon Yoon and
                  Jeong Oh Kye and
                  Yongdae Kim and
                  Hae Young Lee},
  title        = {Decoder-Free Sino-Korean Shellcode},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {75--78},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.21},
  doi          = {10.1109/ICSSA.2016.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/YoonKKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/YuKKH16,
  author       = {Jaegwan Yu and
                  Eunsoo Kim and
                  Hyoungshick Kim and
                  Jun Ho Huh},
  title        = {A Framework for Detecting {MAC} and {IP} Spoofing Attacks with Network
                  Characteristics},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {49--53},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.16},
  doi          = {10.1109/ICSSA.2016.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/YuKKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icssa/2016,
  title        = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7861598/proceeding},
  isbn         = {978-1-5090-4388-0},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics