-
Notifications
You must be signed in to change notification settings - Fork 1
/
Research-Proposal.bib
64 lines (52 loc) · 2.44 KB
/
Research-Proposal.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
%% This BibTeX bibliography file was created using BibDesk.
%% http://bibdesk.sourceforge.net/
%% Created for Joseph Hallett at 2012-02-13 16:23:07 +0000
%% Saved with string encoding Unicode (UTF-8)
@inproceedings{Trostle:2008dv,
Author = {Trostle, J},
Booktitle = {Military Communications Conference, 2008. MILCOM 2008. IEEE},
Date-Added = {2012-02-12 23:54:53 +0000},
Date-Modified = {2012-02-12 23:54:53 +0000},
Pages = {1--7},
Title = {{Applying network address encryption to anonymity and preventing data exfiltration}},
Year = {2008}}
@inproceedings{Liu:2009jb,
Author = {Liu, Yali and Corbett, C and Chiang, Ken and Archibald, R and Mukherjee, B and Ghosal, D},
Booktitle = {System Sciences, 2009.},
Date-Added = {2012-02-12 23:47:15 +0000},
Date-Modified = {2012-02-13 00:03:10 +0000},
Pages = {1--10},
Title = {{SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack}},
Year = {2009}}
@book{Amarilli:2011fm,
Author = {Amarilli, Antoine and M{\"u}ller, Sascha and Naccache, David and Page, Daniel and Rauzy, Pablo and Tunstall, Michael},
Date-Added = {2012-02-12 16:38:30 +0000},
Date-Modified = {2012-02-13 16:23:07 +0000},
Publisher = {Springer Berlin Heidelberg},
Title = {Can Code Polymorphism Limit Information Leakage?},
Year = {2011}}
@article{Zaharis:2011cl,
Author = {Zaharis, Alexandros and Martini, Adamantini and Tryfonas, Theo and Ilioudis, Christos and Pangalos, G},
Date-Added = {2012-02-12 16:11:04 +0000},
Date-Modified = {2012-02-12 16:11:04 +0000},
Journal = {International Journal of Digital Crime and Forensics},
Number = {4},
Pages = {29--41},
Title = {{Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis}},
Volume = {3},
Year = {2011}}
@article{Cifuentes:bq,
Author = {Cifuentes, C and Van Emmerik, M and Ramsey, N},
Date-Added = {2012-02-11 15:36:30 +0000},
Date-Modified = {2012-02-11 15:36:30 +0000},
Journal = {Reverse Engineering, 1999. Proceedings. Sixth Working Conference on},
Pages = {280--291},
Title = {{The design of a resourceable and retargetable binary translator}},
Year = {1999}}
@inproceedings{Cha:2010,
Author = {Cha, Sang Kil and Pak, Brian and Brumley, David and Lipton, Richard Jay},
Booktitle = {Proceedings of the 17th ACM conference on Computer and communications security},
Date-Added = {2012-02-11 13:48:09 +0000},
Date-Modified = {2012-02-13 00:04:42 +0000},
Title = {{Platform-independent programs}},
Year = {2010}}