Search dblp for Publications

export results for "toc:db/series/ais/ais56.bht:"

 download as .bib file

@incollection{DBLP:series/ais/Al-ShaerR15,
  author       = {Ehab Al{-}Shaer and
                  Mohammad Ashiqur Rahman},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Attribution, Temptation, and Expectation: {A} Formal Framework for
                  Defense-by-Deception in Cyberwarfare},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {57--80},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_4},
  doi          = {10.1007/978-3-319-14039-1\_4},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Al-ShaerR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Ben-AsherG15,
  author       = {Noam Ben{-}Asher and
                  Cleotilde Gonzalez},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {CyberWar Game: {A} Paradigm for Understanding New Challenges of Cyber
                  War},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {207--220},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_10},
  doi          = {10.1007/978-3-319-14039-1\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Ben-AsherG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Dumitras15,
  author       = {Tudor Dumitras},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Understanding the Vulnerability Lifecycle for Risk Assessment and
                  Defense Against Sophisticated Cyber Attacks},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {265--285},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_13},
  doi          = {10.1007/978-3-319-14039-1\_13},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Dumitras15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ElderLY15,
  author       = {Robert J. Elder and
                  Alexander H. Levis and
                  Bahram Yousefi},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Alternatives to Cyber Warfare: Deterrence and Assurance},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {15--35},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_2},
  doi          = {10.1007/978-3-319-14039-1\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ElderLY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/GoelH15,
  author       = {Sanjay Goel and
                  Yuan Hong},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber War Games: Strategic Jostling Among Traditional Adversaries},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_1},
  doi          = {10.1007/978-3-319-14039-1\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/GoelH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Hamilton15,
  author       = {Samuel N. Hamilton},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Automated Adversary Profiling},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {141--149},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_7},
  doi          = {10.1007/978-3-319-14039-1\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Hamilton15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/HeckmanS15,
  author       = {Kristin E. Heckman and
                  Frank J. Stech},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber Counterdeception: How to Detect Denial {\&} Deception (D{\&}D)},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {103--140},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_6},
  doi          = {10.1007/978-3-319-14039-1\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/HeckmanS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KiekintveldLP15,
  author       = {Christopher Kiekintveld and
                  Viliam Lis{\'{y}} and
                  Radek P{\'{\i}}bil},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Game-Theoretic Foundations for the Strategic Use of Honeypots in Network
                  Security},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {81--101},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_5},
  doi          = {10.1007/978-3-319-14039-1\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KiekintveldLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/MarbleLMCAS15,
  author       = {Julie L. Marble and
                  William F. Lawless and
                  Ranjeev Mittu and
                  Joseph T. Coyne and
                  Myriam Abramson and
                  Ciara Sibley},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {The Human Factor in Cybersecurity: Robust {\&} Intelligent Defense},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {173--206},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_9},
  doi          = {10.1007/978-3-319-14039-1\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/MarbleLMCAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PaxtonRMH15,
  author       = {Napoleon C. Paxton and
                  Stephen Russell and
                  Ira S. Moskowitz and
                  Paul Hyden},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {A Survey of Community Detection Algorithms Based On Analysis-Intent},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {237--263},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_12},
  doi          = {10.1007/978-3-319-14039-1\_12},
  timestamp    = {Wed, 28 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PaxtonRMH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Prakash15,
  author       = {B. Aditya Prakash},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Graph Mining for Cyber Security},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {287--306},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_14},
  doi          = {10.1007/978-3-319-14039-1\_14},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Prakash15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PuzisE15,
  author       = {Rami Puzis and
                  Yuval Elovici},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Active Discovery of Hidden Profiles in Social Networks Using Malware},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {221--235},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_11},
  doi          = {10.1007/978-3-319-14039-1\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PuzisE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/RuefR15,
  author       = {Andrew Ruef and
                  Chris Rohlf},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Programming Language Theoretic Security in the Real World: {A} Mirage
                  or the Future?},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {307--321},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_15},
  doi          = {10.1007/978-3-319-14039-1\_15},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/RuefR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ShakarianSMP15,
  author       = {Paulo Shakarian and
                  Gerardo I. Simari and
                  Geoffrey Moores and
                  Simon Parsons},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber Attribution: An Argumentation-Based Approach},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {151--171},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_8},
  doi          = {10.1007/978-3-319-14039-1\_8},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ShakarianSMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SweeneyC15,
  author       = {Patrick Sweeney and
                  George Cybenko},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Identifying and Exploiting the Cyber High Ground for Botnets},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {37--56},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_3},
  doi          = {10.1007/978-3-319-14039-1\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SweeneyC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/56,
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1},
  doi          = {10.1007/978-3-319-14039-1},
  isbn         = {978-3-319-14038-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/56.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}