default search action
Search dblp for Publications
export results for "toc:db/conf/sp/spw2017.bht:"
@inproceedings{DBLP:conf/sp/0001BSW17, author = {Michael Backes and Sven Bugiel and Philipp von Styp{-}Rekowsky and Marvin WiBfeld}, title = {Seamless In-App Ad Blocking on Stock Android}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {163--168}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.24}, doi = {10.1109/SPW.2017.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/0001BSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/0001SW17, author = {J{\"{o}}rg Keller and Gabriele Spenger and Steffen Wendzel}, title = {Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {17--22}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.31}, doi = {10.1109/SPW.2017.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/0001SW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AlbabILBV17, author = {Kinan Dak Albab and Rawane Issa and Andrei Lapets and Azer Bestavros and Nikolaj Volgushev}, title = {Scalable Secure Multi-party Network Vulnerability Analysis via Symbolic Optimization}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {211--216}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.21}, doi = {10.1109/SPW.2017.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/AlbabILBV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AnantharamanLCL17, author = {Prashant Anantharaman and Michael E. Locasto and Gabriela F. Ciocarlie and Ulf Lindqvist}, title = {Building Hardened Internet-of-Things Clients with Language-Theoretic Security}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {120--126}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.36}, doi = {10.1109/SPW.2017.36}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/AnantharamanLCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BasetD17, author = {Aniqua Z. Baset and Tamara Denning}, title = {{IDE} Plugins for Detecting Input-Validation Vulnerabilities}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {143--146}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.37}, doi = {10.1109/SPW.2017.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BasetD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BieschkeHRS17, author = {Tobias Bieschke and Lars Hermerschmidt and Bernhard Rumpe and Peter Stanchev}, title = {Eliminating Input-Based Attacks by Deriving Automated Encoders and Decoders from Context-Free Grammars}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {93--101}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.32}, doi = {10.1109/SPW.2017.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BieschkeHRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Bottinger17, author = {Konstantin B{\"{o}}ttinger}, title = {Guiding a Colony of Black-Box Fuzzers with Chemotaxis}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {11--16}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.10}, doi = {10.1109/SPW.2017.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Bottinger17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CamachoGM17, author = {Jos{\'{e}} Camacho and Pedro Garcia{-}Teodoro and Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez}, title = {Traffic Monitoring and Diagnosis with Multivariate Statistical Network Monitoring: {A} Case Study}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {241--246}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.11}, doi = {10.1109/SPW.2017.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/CamachoGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChattopadhyaySR17, author = {Ankur Chattopadhyay and Michael J. Schulz and Clinton Rettler and Katie Turkiewicz and Laleah Fernandez and Askar Ziganshin}, title = {Towards a Biometric Authentication-Based Hybrid Trust-Computing Approach for Verification of Provider Profiles in Online Healthcare Information}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {56--65}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.23}, doi = {10.1109/SPW.2017.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChattopadhyaySR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChifflierC17, author = {Pierre Chifflier and Geoffroy Couprie}, title = {Writing Parsers Like it is 2017}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {80--92}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.39}, doi = {10.1109/SPW.2017.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChifflierC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Costin17, author = {Andrei Costin}, title = {Lua Code: Security Overview and Practical Approaches to Static Analysis}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {132--142}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.38}, doi = {10.1109/SPW.2017.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Costin17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FulpGM17, author = {Errin W. Fulp and H. Donald Gage and Matthew R. McNiece}, title = {Using Evolutionary Diversity to Identify Problematic Software Parameters}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {35--40}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.28}, doi = {10.1109/SPW.2017.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FulpGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GasserSDSC17, author = {Oliver Gasser and Quirin Scheitle and Carl Denis and Nadja Schricker and Georg Carle}, title = {Security Implications of Publicly Reachable Building Automation Systems}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {199--204}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.13}, doi = {10.1109/SPW.2017.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/GasserSDSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Ham17, author = {Jeroen van der Ham}, title = {Ethics and Internet Measurements}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {247--251}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.17}, doi = {10.1109/SPW.2017.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Ham17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiF17, author = {Ruidan Li and Errin W. Fulp}, title = {Evolutionary Approaches for Resilient Surveillance Management}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {23--28}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.27}, doi = {10.1109/SPW.2017.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LiF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiuCWYER17, author = {Fang Liu and Haipeng Cai and Gang Wang and Danfeng Yao and Karim O. Elish and Barbara G. Ryder}, title = {MR-Droid: {A} Scalable and Prioritized Analysis of Inter-App Communication Risks}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {189--198}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.12}, doi = {10.1109/SPW.2017.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LiuCWYER17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LuBKR17, author = {Yi Lu and Sora Bae and Padmanabhan Krishnan and K. R. Raghavendra}, title = {Inference of Security-Sensitive Entities in Libraries}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {102--109}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.26}, doi = {10.1109/SPW.2017.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LuBKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LucksGK17, author = {Stefan Lucks and Norina Marie Grosch and Joshua Konig}, title = {Taming the Length Field in Binary Data: Calc-Regular Languages}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {66--79}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.33}, doi = {10.1109/SPW.2017.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LucksGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/OHanlonBH17, author = {Piers O'Hanlon and Ravishankar Borgaonkar and Lucca Hirschi}, title = {Mobile Subscriber WiFi Privacy}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {169--178}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.14}, doi = {10.1109/SPW.2017.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/OHanlonBH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PhungMRS17, author = {Phu H. Phung and Abhinav Mohanty and Rahul Rachapalli and Meera Sridhar}, title = {HybridGuard: {A} Principal-Based Permission and Fine-Grained Policy Enforcement Framework for Web-Based Mobile Applications}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {147--156}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.34}, doi = {10.1109/SPW.2017.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/PhungMRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PowellKGVSN17, author = {Brian M. Powell and Ekampreet Kalsy and Gaurav Goswami and Mayank Vatsa and Richa Singh and Afzel Noore}, title = {Attack-Resistant aiCAPTCHA Using a Negative Selection Artificial Immune System}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {41--46}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.22}, doi = {10.1109/SPW.2017.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/PowellKGVSN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PrandlLPSK17, author = {Stefan Prandl and Mihai M. Lazarescu and Duc{-}Son Pham and Sieteng Soh and Subhash C. Kak}, title = {An Investigation of Power Law Probability Distributions for Network Anomaly Detection}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {217--222}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.20}, doi = {10.1109/SPW.2017.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/PrandlLPSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PrasseMPHS17, author = {Paul Prasse and Luk{\'{a}}s Machlica and Tom{\'{a}}s Pevn{\'{y}} and Jir{\'{\i}} Havelka and Tobias Scheffer}, title = {Malware Detection by Analysing Network Traffic with Neural Networks}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {205--210}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.8}, doi = {10.1109/SPW.2017.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/PrasseMPHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ReddyOLDWKFMHR17, author = {Aarthi Reddy and Meredith Ordway{-}West and Melissa Lee and Matt Dugan and Joshua Whitney and Ronen Kahana and Brad Ford and Johan Muedsam and Austin Henslee and Max Rao}, title = {Using Gaussian Mixture Models to Detect Outliers in Seasonal Univariate Network Traffic}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {229--234}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.9}, doi = {10.1109/SPW.2017.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ReddyOLDWKFMHR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RoseLA17, author = {Jamison Rose and Yudong Liu and Ahmed Awad}, title = {Biometric Authentication Using Mouse and Eye Movement Data}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {47--55}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.18}, doi = {10.1109/SPW.2017.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/RoseLA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SalahE17, author = {Hisham Salah and Mohamed Eltoweissy}, title = {On the Personalization of Trust Management}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.25}, doi = {10.1109/SPW.2017.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SalahE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SextonCN17, author = {Julian Sexton and Andrey Chudnov and David A. Naumann}, title = {Spartan Jester: End-to-End Information Flow Control for Hybrid Android Applications}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {157--162}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.15}, doi = {10.1109/SPW.2017.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SextonCN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ShahbarZ17, author = {Khalid Shahbar and Nur Zincir{-}Heywood}, title = {Effects of Shared Bandwidth on Anonymity of the {I2P} Network Users}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {235--240}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.19}, doi = {10.1109/SPW.2017.19}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ShahbarZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ShepherdGFMAPM17, author = {Carlton Shepherd and Iakovos Gurulian and Eibe Frank and Konstantinos Markantonakis and Raja Naeem Akram and Emmanouil Panaousis and Keith Mayes}, title = {The Applicability of Ambient Sensors as Proximity Evidence for {NFC} Transactions}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {179--188}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.29}, doi = {10.1109/SPW.2017.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ShepherdGFMAPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TorreyBT17, author = {Jacob I. Torrey and Mark P. Bridgman and Tomasz Tuzel}, title = {Research Report: Hardware-Enforcement of Walther-Recursive Program Functions}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {127--131}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.30}, doi = {10.1109/SPW.2017.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/TorreyBT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TseJ17, author = {Kit Sum Tse and Peter C. Johnson}, title = {A Framework for Validating Session Protocols}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {110--119}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.35}, doi = {10.1109/SPW.2017.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/TseJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WendzelMH17, author = {Steffen Wendzel and Wojciech Mazurczyk and Georg Haas}, title = {Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {29--34}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.40}, doi = {10.1109/SPW.2017.40}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/WendzelMH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhaiXCPLX17, author = {Aonan Zhai and Fei Xu and Zigang Cao and Haiqing Pan and Zhen Li and Gang Xiong}, title = {Real Time Network File Similarity Detection Based on Approximate Matching}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {223--228}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.16}, doi = {10.1109/SPW.2017.16}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhaiXCPLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/2017w, title = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8226722/proceeding}, isbn = {978-1-5386-1968-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/2017w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.