Search dblp for Publications

export results for "toc:db/journals/dtrap/dtrap1.bht:"

 download as .bib file

@article{DBLP:journals/dtrap/0001JPZ20,
  author       = {Xinyi Zhou and
                  Atishay Jain and
                  Vir V. Phoha and
                  Reza Zafarani},
  title        = {Fake News Early Detection: {A} Theory-driven Model},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {2},
  pages        = {12:1--12:25},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377478},
  doi          = {10.1145/3377478},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/0001JPZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/AgadakosDJWASWK20,
  author       = {Ioannis Agadakos and
                  Nicholas DeMarinis and
                  Di Jin and
                  Kent Williams{-}King and
                  Jearson Alfajardo and
                  Benjamin Shteinfeld and
                  David Williams{-}King and
                  Vasileios P. Kemerlis and
                  Georgios Portokalidis},
  title        = {Large-scale Debloating of Binary Shared Libraries},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {19:1--19:28},
  year         = {2020},
  url          = {https://doi.org/10.1145/3414997},
  doi          = {10.1145/3414997},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/AgadakosDJWASWK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Burton20,
  author       = {Ren{\'{e}}e Burton},
  title        = {Unsupervised Learning Techniques for Malware Characterization: Understanding
                  Certain DNS-based DDoS Attacks},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {3},
  pages        = {14:1--14:26},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377869},
  doi          = {10.1145/3377869},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Burton20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ChevalierPDH20,
  author       = {Ronny Chevalier and
                  David Plaquin and
                  Chris I. Dalton and
                  Guillaume Hiet},
  title        = {Intrusion Survivability for Commodity Operating Systems},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {21:1--21:30},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419471},
  doi          = {10.1145/3419471},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ChevalierPDH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ChuaYGL20,
  author       = {Mark Yep{-}Kui Chua and
                  George O. M. Yee and
                  Yuan Xiang Gu and
                  Chung{-}Horng Lung},
  title        = {Threats to Online Advertising and Countermeasures: {A} Technical Survey},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {2},
  pages        = {11:1--11:27},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374136},
  doi          = {10.1145/3374136},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ChuaYGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/CormackH20,
  author       = {Andrew Cormack and
                  Jeroen van der Ham},
  title        = {Introduction to the {FIRST} Special Issue},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {1},
  pages        = {2:1--2:3},
  year         = {2020},
  url          = {https://doi.org/10.1145/3380746},
  doi          = {10.1145/3380746},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/CormackH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/DurvauxD20,
  author       = {Fran{\c{c}}ois Durvaux and
                  Marc Durvaux},
  title        = {SCA-Pitaya: {A} Practical and Affordable Side-Channel Attack Setup
                  for Power Leakage-Based Evaluations},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {1},
  pages        = {3:1--3:16},
  year         = {2020},
  url          = {https://doi.org/10.1145/3371393},
  doi          = {10.1145/3371393},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/DurvauxD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/GajraniTL0ZG20,
  author       = {Jyoti Gajrani and
                  Meenakshi Tripathi and
                  Vijay Laxmi and
                  Gaurav Somani and
                  Akka Zemmari and
                  Manoj Singh Gaur},
  title        = {\emph{Vulvet}: Vetting of Vulnerabilities in Android Apps to Thwart
                  Exploitation},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {2},
  pages        = {10:1--10:25},
  year         = {2020},
  url          = {https://doi.org/10.1145/3376121},
  doi          = {10.1145/3376121},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/GajraniTL0ZG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/GutzwillerDP20,
  author       = {Robert S. Gutzwiller and
                  Josiah Dykstra and
                  Bryan D. Payne},
  title        = {Gaps and Opportunities in Situational Awareness for Cybersecurity},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {3},
  pages        = {18:1--18:6},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384471},
  doi          = {10.1145/3384471},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/GutzwillerDP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/KarimCHCB20,
  author       = {Imtiaz Karim and
                  Fabrizio Cicala and
                  Syed Rafiul Hussain and
                  Omar Chowdhury and
                  Elisa Bertino},
  title        = {ATFuzzer: Dynamic Analysis Framework of {AT} Interface for Android
                  Smartphones},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {23:1--23:29},
  year         = {2020},
  url          = {https://doi.org/10.1145/3416125},
  doi          = {10.1145/3416125},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/KarimCHCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/KohlrauschB20,
  author       = {Jan Kohlrausch and
                  Eugene A. Brin},
  title        = {{ARIMA} Supplemented Security Metrics for Quality Assurance and Situational
                  Awareness},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {1},
  pages        = {6:1--6:21},
  year         = {2020},
  url          = {https://doi.org/10.1145/3376926},
  doi          = {10.1145/3376926},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/KohlrauschB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Koot20,
  author       = {Matthijs R. Koot},
  title        = {Field Note on {CVE-2019-11510:} Pulse Connect Secure {SSL-VPN} in
                  the Netherlands},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {2},
  pages        = {13:1--13:7},
  year         = {2020},
  url          = {https://doi.org/10.1145/3382765},
  doi          = {10.1145/3382765},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Koot20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/LakhotiaM20,
  author       = {Arun Lakhotia and
                  Leigh Metcalf},
  title        = {Digital Threats: Research and Practice Inaugural Issue Editorial},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {1},
  pages        = {1:1--1:3},
  year         = {2020},
  url          = {https://doi.org/10.1145/3380320},
  doi          = {10.1145/3380320},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/LakhotiaM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/LaurenzaLM20,
  author       = {Giuseppe Laurenza and
                  Riccardo Lazzeretti and
                  Luca Mazzotti},
  title        = {Malware Triage for Early Identification of Advanced Persistent Threat
                  Activities},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {3},
  pages        = {16:1--16:17},
  year         = {2020},
  url          = {https://doi.org/10.1145/3386581},
  doi          = {10.1145/3386581},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/LaurenzaLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/OsmanMHY20,
  author       = {Tousif Osman and
                  Mohammad Mannan and
                  Urs Hengartner and
                  Amr M. Youssef},
  title        = {Securing Applications against Side-channel Attacks through Resource
                  Access Veto},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {22:1--22:29},
  year         = {2020},
  url          = {https://doi.org/10.1145/3416124},
  doi          = {10.1145/3416124},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/OsmanMHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/PalitMP20,
  author       = {Tapti Palit and
                  Fabian Monrose and
                  Michalis Polychronakis},
  title        = {Mitigating Data-only Attacks by Protecting Memory-resident Sensitive
                  Data},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {20:1--20:26},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419475},
  doi          = {10.1145/3419475},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/PalitMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/PerdisciLDLKS20,
  author       = {Roberto Perdisci and
                  Martina Lindorfer and
                  Adam Doup{\'{e}} and
                  Andrea Lanzi and
                  Alexandros Kapravelos and
                  Gianluca Stringhini},
  title        = {Introduction to the ACSAC'19 Special Issue - Part 1},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {19e:1--19e:3},
  year         = {2020},
  url          = {https://doi.org/10.1145/3437251},
  doi          = {10.1145/3437251},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/PerdisciLDLKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Sacher20,
  author       = {Desiree Sacher},
  title        = {Fingerpointing False Positives: How to Better Integrate Continuous
                  Improvement into Security Monitoring},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {1},
  pages        = {7:1--7:7},
  year         = {2020},
  url          = {https://doi.org/10.1145/3370084},
  doi          = {10.1145/3370084},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Sacher20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Sanchez-RolaBS20,
  author       = {Iskander S{\'{a}}nchez{-}Rola and
                  Davide Balzarotti and
                  Igor Santos},
  title        = {Cookies from the Past: Timing Server-side Request Processing Code
                  for History Sniffing},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {24:1--24:24},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419473},
  doi          = {10.1145/3419473},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Sanchez-RolaBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ScofieldMK20,
  author       = {Daniel Scofield and
                  Craig Miles and
                  Stephen Kuhn},
  title        = {Automated Model Learning for Accurate Detection of Malicious Digital
                  Documents},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {3},
  pages        = {15:1--15:21},
  year         = {2020},
  url          = {https://doi.org/10.1145/3379505},
  doi          = {10.1145/3379505},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ScofieldMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ShuklaKMPJP20,
  author       = {Diksha Shukla and
                  Partha Pratim Kundu and
                  Ravichandra Malapati and
                  Sujit Poudel and
                  Zhanpeng Jin and
                  Vir V. Phoha},
  title        = {Thinking Unveiled: An Inference and Correlation Model to Attack {EEG}
                  Biometrics},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {2},
  pages        = {9:1--9:29},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374137},
  doi          = {10.1145/3374137},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ShuklaKMPJP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Steinhauser020,
  author       = {Anton{\'{\i}}n Steinhauser and
                  Petr Tuma},
  title        = {Database Traffic Interception for Graybox Detection of Stored and
                  Context-sensitive {XSS}},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {3},
  pages        = {17:1--17:23},
  year         = {2020},
  url          = {https://doi.org/10.1145/3399668},
  doi          = {10.1145/3399668},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Steinhauser020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/TienCBK20,
  author       = {Chin{-}Wei Tien and
                  Shang{-}Wen Chen and
                  Tao Ban and
                  Sy{-}Yen Kuo},
  title        = {Machine Learning Framework to Analyze IoT Malware Using {ELF} and
                  Opcode Features},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {1},
  pages        = {5:1--5:19},
  year         = {2020},
  url          = {https://doi.org/10.1145/3378448},
  doi          = {10.1145/3378448},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/TienCBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ToornS20,
  author       = {Olivier van der Toorn and
                  Anna Sperotto},
  title        = {Looking Beyond the Horizon: Thoughts on Proactive Detection of Threats},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {1},
  pages        = {4:1--4:13},
  year         = {2020},
  url          = {https://doi.org/10.1145/3373639},
  doi          = {10.1145/3373639},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ToornS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/UkropKM20,
  author       = {Martin Ukrop and
                  Lydia Kraus and
                  Vashek Matyas},
  title        = {Will You Trust This {TLS} Certificate?: Perceptions of People Working
                  in {IT} (Extended Version)},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {25:1--25:29},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419472},
  doi          = {10.1145/3419472},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/UkropKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/WakedMY20,
  author       = {Louis Waked and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {The Sorry State of {TLS} Security in Enterprise Interception Appliances},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {2},
  pages        = {8:1--8:26},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372802},
  doi          = {10.1145/3372802},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/WakedMY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}