Trading Elephants for Ants: Efficient Post-attack Reconstitution.
M. Le, Z. Wang, Q. Jia, A. Stavrou, A. Ghosh, and S. Jajodia. SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 460-469. Springer, (2011)
Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/securecomm/LeWJSGJ11
%A Le, Meixing
%A Wang, Zhaohui
%A Jia, Quan
%A Stavrou, Angelos
%A Ghosh, Anup K.
%A Jajodia, Sushil
%B SecureComm
%D 2011
%E Rajarajan, Muttukrishnan
%E Piper, Fred
%E Wang, Haining
%E Kesidis, George
%I Springer
%K dblp
%P 460-469
%T Trading Elephants for Ants: Efficient Post-attack Reconstitution.
%U http://dblp.uni-trier.de/db/conf/securecomm/securecomm2011.html#LeWJSGJ11
%V 96
%@ 978-3-642-31908-2
@inproceedings{conf/securecomm/LeWJSGJ11,
added-at = {2019-09-25T00:00:00.000+0200},
author = {Le, Meixing and Wang, Zhaohui and Jia, Quan and Stavrou, Angelos and Ghosh, Anup K. and Jajodia, Sushil},
biburl = {https://www.bibsonomy.org/bibtex/2be513f6ce177da21bf8976a97cdf33b9/dblp},
booktitle = {SecureComm},
crossref = {conf/securecomm/2011},
editor = {Rajarajan, Muttukrishnan and Piper, Fred and Wang, Haining and Kesidis, George},
ee = {https://doi.org/10.1007/978-3-642-31909-9_27},
interhash = {0b66379f960ec8258c908c683afe4bff},
intrahash = {be513f6ce177da21bf8976a97cdf33b9},
isbn = {978-3-642-31908-2},
keywords = {dblp},
pages = {460-469},
publisher = {Springer},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
timestamp = {2019-09-26T13:38:24.000+0200},
title = {Trading Elephants for Ants: Efficient Post-attack Reconstitution.},
url = {http://dblp.uni-trier.de/db/conf/securecomm/securecomm2011.html#LeWJSGJ11},
volume = 96,
year = 2011
}