default search action
Search dblp for Publications
export results for "toc:db/series/ais/ais56.bht:"
@incollection{DBLP:series/ais/Al-ShaerR15, author = {Ehab Al{-}Shaer and Mohammad Ashiqur Rahman}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Attribution, Temptation, and Expectation: {A} Formal Framework for Defense-by-Deception in Cyberwarfare}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {57--80}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_4}, doi = {10.1007/978-3-319-14039-1\_4}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Al-ShaerR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Ben-AsherG15, author = {Noam Ben{-}Asher and Cleotilde Gonzalez}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {CyberWar Game: {A} Paradigm for Understanding New Challenges of Cyber War}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {207--220}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_10}, doi = {10.1007/978-3-319-14039-1\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Ben-AsherG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Dumitras15, author = {Tudor Dumitras}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {265--285}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_13}, doi = {10.1007/978-3-319-14039-1\_13}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Dumitras15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ElderLY15, author = {Robert J. Elder and Alexander H. Levis and Bahram Yousefi}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Alternatives to Cyber Warfare: Deterrence and Assurance}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {15--35}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_2}, doi = {10.1007/978-3-319-14039-1\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ElderLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/GoelH15, author = {Sanjay Goel and Yuan Hong}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Cyber War Games: Strategic Jostling Among Traditional Adversaries}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {1--13}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_1}, doi = {10.1007/978-3-319-14039-1\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/GoelH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Hamilton15, author = {Samuel N. Hamilton}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Automated Adversary Profiling}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {141--149}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_7}, doi = {10.1007/978-3-319-14039-1\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Hamilton15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/HeckmanS15, author = {Kristin E. Heckman and Frank J. Stech}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Cyber Counterdeception: How to Detect Denial {\&} Deception (D{\&}D)}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {103--140}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_6}, doi = {10.1007/978-3-319-14039-1\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/HeckmanS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KiekintveldLP15, author = {Christopher Kiekintveld and Viliam Lis{\'{y}} and Radek P{\'{\i}}bil}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {81--101}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_5}, doi = {10.1007/978-3-319-14039-1\_5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KiekintveldLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/MarbleLMCAS15, author = {Julie L. Marble and William F. Lawless and Ranjeev Mittu and Joseph T. Coyne and Myriam Abramson and Ciara Sibley}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {The Human Factor in Cybersecurity: Robust {\&} Intelligent Defense}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {173--206}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_9}, doi = {10.1007/978-3-319-14039-1\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/MarbleLMCAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PaxtonRMH15, author = {Napoleon C. Paxton and Stephen Russell and Ira S. Moskowitz and Paul Hyden}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {A Survey of Community Detection Algorithms Based On Analysis-Intent}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {237--263}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_12}, doi = {10.1007/978-3-319-14039-1\_12}, timestamp = {Wed, 28 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PaxtonRMH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Prakash15, author = {B. Aditya Prakash}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Graph Mining for Cyber Security}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {287--306}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_14}, doi = {10.1007/978-3-319-14039-1\_14}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Prakash15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PuzisE15, author = {Rami Puzis and Yuval Elovici}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Active Discovery of Hidden Profiles in Social Networks Using Malware}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {221--235}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_11}, doi = {10.1007/978-3-319-14039-1\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PuzisE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/RuefR15, author = {Andrew Ruef and Chris Rohlf}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Programming Language Theoretic Security in the Real World: {A} Mirage or the Future?}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {307--321}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_15}, doi = {10.1007/978-3-319-14039-1\_15}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/RuefR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ShakarianSMP15, author = {Paulo Shakarian and Gerardo I. Simari and Geoffrey Moores and Simon Parsons}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Cyber Attribution: An Argumentation-Based Approach}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {151--171}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_8}, doi = {10.1007/978-3-319-14039-1\_8}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ShakarianSMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SweeneyC15, author = {Patrick Sweeney and George Cybenko}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Identifying and Exploiting the Cyber High Ground for Botnets}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {37--56}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_3}, doi = {10.1007/978-3-319-14039-1\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SweeneyC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/56, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1}, doi = {10.1007/978-3-319-14039-1}, isbn = {978-3-319-14038-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/56.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.