Entry Dolgikh:2012:UBM from lncs2012i.bib
Last update: Sun Mar 31 02:49:53 MDT 2019
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Dolgikh:2012:UBM,
author = "Andrey Dolgikh and Tomas Nykodym and Victor Skormin
and Zachary Birnbaum",
title = "Using Behavioral Modeling and Customized Normalcy
Profiles as Protection against Targeted Cyber-Attacks",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7531",
pages = "191--202",
year = "2012",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-33704-8_17",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Wed Dec 19 15:24:26 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-33704-8_17/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-33704-8",
book-URL = "http://www.springerlink.com/content/978-3-642-33704-8",
fjournal = "Lecture Notes in Computer Science",
}
Related entries
- against,
7539(0)94,
7549(0)1
- Behavioral,
7531(0)226
- Modeling,
7502(0)146,
7502(0)161,
7507(0)153,
7510(0)50,
7510(0)107,
7512(0)10,
7518(0)23,
7518(0)99,
7518(0)111,
7518(0)141,
7518(0)162,
7518(0)171,
7521(0)183,
7523(0)2,
7526(0)168,
7527(0)63,
7532(0)266,
7539(0)209,
7541(0)63
- Profiles,
7547(0)134
- Protection,
7528(0)1,
7533(0)305
- Using,
7503(0)181,
7507(0)1,
7507(0)198,
7509(0)1,
7509(0)18,
7509(0)194,
7509(0)203,
7510(0)10,
7510(0)42,
7510(0)124,
7510(0)141,
7511(0)57,
7511(0)82,
7511(0)98,
7511(0)114,
7511(0)146,
7512(0)1,
7512(0)66,
7512(0)115,
7512(0)156,
7513(0)14,
7513(0)110,
7515(0)29,
7515(0)105,
7515(0)121,
7515(0)152,
7515(0)213,
7516(0)121,
7517(0)1,
7518(0)162,
7519(0)176,
7521(0)90,
7521(0)151,
7524(0)180,
7526(0)1,
7526(0)49,
7526(0)85,
7526(0)217,
7528(0)174,
7530(0)75,
7531(0)226,
7532(0)88,
7534(0)14,
7534(0)201,
7541(0)1,
7541(0)97,
7543(0)194,
7548(0)83