default search action
Search dblp for Publications
export results for "toc:db/conf/icssa/icssa2019.bht:"
@inproceedings{DBLP:conf/icssa/EresheimKK19, author = {Sebastian Eresheim and Lukas Daniel Klausner and Patrick Kochberger}, title = {Anomaly Detection Support Using Process Classification}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2019, St. P{\"{o}}lten, Austria, July 25-26, 2019}, pages = {27--40}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICSSA48308.2019.00011}, doi = {10.1109/ICSSA48308.2019.00011}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/EresheimKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/KiesebergSFW19, author = {Peter Kieseberg and Sebastian Schrittwieser and Peter Fr{\"{u}}hwirt and Edgar R. Weippl}, title = {Analysis of the Internals of MySQL/InnoDB {B+} Tree Index Navigation from a Forensic Perspective}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2019, St. P{\"{o}}lten, Austria, July 25-26, 2019}, pages = {46--51}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICSSA48308.2019.00013}, doi = {10.1109/ICSSA48308.2019.00013}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/KiesebergSFW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/KiesebergSW19, author = {Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl}, title = {Fingerprinting using database steganography}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2019, St. P{\"{o}}lten, Austria, July 25-26, 2019}, pages = {16--20}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICSSA48308.2019.00009}, doi = {10.1109/ICSSA48308.2019.00009}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/KiesebergSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/KochbergerTS19, author = {Patrick Kochberger and Alexander Tauber and Sebastian Schrittwieser}, title = {Assessment of the Transparency of the Windows Subsystem for Linux {(WSL)}}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2019, St. P{\"{o}}lten, Austria, July 25-26, 2019}, pages = {60--69}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICSSA48308.2019.00015}, doi = {10.1109/ICSSA48308.2019.00015}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/KochbergerTS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/MullerLWRPHZ19, author = {Heimo M{\"{u}}ller and Martina Lang and Bernhard Wieser and Robert Reihs and Birgit Pohn and Andreas Holzinger and Kurt Zatloukal}, title = {Acceptance of Virtual Health Avatars}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2019, St. P{\"{o}}lten, Austria, July 25-26, 2019}, pages = {70--75}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICSSA48308.2019.00016}, doi = {10.1109/ICSSA48308.2019.00016}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/MullerLWRPHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/PipekP19, author = {Thomas Pipek and Martin Pirker}, title = {Revisiting the Challenges of Input Parsing for Robust and Secure Software}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2019, St. P{\"{o}}lten, Austria, July 25-26, 2019}, pages = {41--45}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICSSA48308.2019.00012}, doi = {10.1109/ICSSA48308.2019.00012}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/PipekP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/RizviAC19, author = {Syed Rizvi and Kieran Alden and Shakir Campbell}, title = {A Hybrid Framework for Detecting Repackaged Applications on the Android Market}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2019, St. P{\"{o}}lten, Austria, July 25-26, 2019}, pages = {76--82}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICSSA48308.2019.00017}, doi = {10.1109/ICSSA48308.2019.00017}, timestamp = {Wed, 06 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/RizviAC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/RizviIRT19, author = {Syed Rizvi and Jarrett Imler and Luke Ritchey and Michael Tokar}, title = {Securing {PKES:} Integrating Artificial Intelligence Into {PKES} Forcefield For Anomaly Detection}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2019, St. P{\"{o}}lten, Austria, July 25-26, 2019}, pages = {10--15}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICSSA48308.2019.00008}, doi = {10.1109/ICSSA48308.2019.00008}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/RizviIRT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/RizviMR19, author = {Syed Rizvi and Nicholas McIntyre and Jungwoo Ryoo}, title = {Computing Security Scores for IoT Device Vulnerabilities}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2019, St. P{\"{o}}lten, Austria, July 25-26, 2019}, pages = {52--59}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICSSA48308.2019.00014}, doi = {10.1109/ICSSA48308.2019.00014}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/RizviMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/ShuklaK19, author = {Ankur Shukla and Basel Katt}, title = {Change Point Problem in Security Vulnerability Discovery Model}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2019, St. P{\"{o}}lten, Austria, July 25-26, 2019}, pages = {21--26}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICSSA48308.2019.00010}, doi = {10.1109/ICSSA48308.2019.00010}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/ShuklaK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icssa/2019, title = {International Conference on Software Security and Assurance, {ICSSA} 2019, St. P{\"{o}}lten, Austria, July 25-26, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICSSA48308.2019}, doi = {10.1109/ICSSA48308.2019}, isbn = {978-1-7281-5912-6}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.