Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icssa/icssa2016.bht:"
@inproceedings{DBLP:conf/icssa/Anand16, author = {Priya Anand}, title = {Overview of Root Causes of Software Vulnerabilities - Technical and User-Side Perspectives}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {70--74}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.20}, doi = {10.1109/ICSSA.2016.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/Anand16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/BragaD16, author = {Alexandre Melo Braga and Ricardo Dahab}, title = {Towards a Methodology for the Development of Secure Cryptographic Software}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {25--30}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.12}, doi = {10.1109/ICSSA.2016.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/BragaD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/BuhovTS16, author = {Damjan Buhov and Richard Thron and Sebastian Schrittwieser}, title = {Catch Me if You Can! Transparent Detection of Shellcode}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {60--63}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.18}, doi = {10.1109/ICSSA.2016.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/BuhovTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/ChoiL16, author = {Su Yeon Choi and Hae Young Lee}, title = {Toward Automated Scanning for Code Injection Vulnerabilities in HTML5-Based Mobile Apps}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {24}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.11}, doi = {10.1109/ICSSA.2016.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/ChoiL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/EignerKT16, author = {Oliver Eigner and Philipp Kreimel and Paul Tavolato}, title = {Detection of Man-in-the-Middle Attacks on Industrial Control Networks}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {64--69}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.19}, doi = {10.1109/ICSSA.2016.19}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/EignerKT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/KhanI16, author = {Naurin Farooq Khan and Naveed Ikram}, title = {Security Requirements Engineering: {A} Systematic Mapping {(2010-2015)}}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {31--36}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.13}, doi = {10.1109/ICSSA.2016.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/KhanI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/KoivunenRL16, author = {Lauri Koivunen and Sampsa Rauti and Ville Lepp{\"{a}}nen}, title = {Applying Internal Interface Diversification to IoT Operating Systems}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.7}, doi = {10.1109/ICSSA.2016.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/KoivunenRL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/LeeKKK16, author = {Sora Lee and Jinwoo Kim and Sangjun Ko and Hyoungshick Kim}, title = {A Security Analysis of Paid Subscription Video-on-Demand Services for Online Learning}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {43--48}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.15}, doi = {10.1109/ICSSA.2016.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/LeeKKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/PirkerN16, author = {Martin Pirker and Andreas Nusser}, title = {Assessment of Server State via Inter-Clone Differences}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {54--59}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.17}, doi = {10.1109/ICSSA.2016.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/PirkerN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/SerovL16, author = {Igor Serov and Maria Leitner}, title = {An Experimental Approach to Reputation in E-Participation}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {37--42}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.14}, doi = {10.1109/ICSSA.2016.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/SerovL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/TemperT16, author = {Marlies Temper and Simon Tjoa}, title = {The Applicability of Fuzzy Rough Classifier for Continuous Person Authentication}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {17--23}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.10}, doi = {10.1109/ICSSA.2016.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/TemperT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/WegererT16, author = {Mathias Wegerer and Simon Tjoa}, title = {Defeating the Database Adversary Using Deception - {A} MySQL Database Honeypot}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {6--10}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.8}, doi = {10.1109/ICSSA.2016.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/WegererT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/Wotawa16, author = {Franz Wotawa}, title = {On the Automation of Security Testing}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {11--16}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.9}, doi = {10.1109/ICSSA.2016.9}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/Wotawa16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/YoonKKL16, author = {Ji{-}Hyeon Yoon and Jeong Oh Kye and Yongdae Kim and Hae Young Lee}, title = {Decoder-Free Sino-Korean Shellcode}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {75--78}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.21}, doi = {10.1109/ICSSA.2016.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/YoonKKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/YuKKH16, author = {Jaegwan Yu and Eunsoo Kim and Hyoungshick Kim and Jun Ho Huh}, title = {A Framework for Detecting {MAC} and {IP} Spoofing Attacks with Network Characteristics}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {49--53}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.16}, doi = {10.1109/ICSSA.2016.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/YuKKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icssa/2016, title = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7861598/proceeding}, isbn = {978-1-5090-4388-0}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.