Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/cns/SoroushAMIMGFRB20
%A Soroush, Hamed
%A Albanese, Massimiliano
%A Mehrabadi, Milad Asgari
%A Iganibo, Ibifubara
%A Mosko, Marc
%A Gao, Jason H.
%A Fritz, David J.
%A Rane, Shantanu
%A Bier, Eric
%B CNS
%D 2020
%I IEEE
%K dblp
%P 1-10
%T SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs.
%U http://dblp.uni-trier.de/db/conf/cns/cns2020.html#SoroushAMIMGFRB20
%@ 978-1-7281-4760-4
@inproceedings{conf/cns/SoroushAMIMGFRB20,
added-at = {2021-10-14T00:00:00.000+0200},
author = {Soroush, Hamed and Albanese, Massimiliano and Mehrabadi, Milad Asgari and Iganibo, Ibifubara and Mosko, Marc and Gao, Jason H. and Fritz, David J. and Rane, Shantanu and Bier, Eric},
biburl = {https://www.bibsonomy.org/bibtex/2f6d930e0c8760917154abe687c1238e5/dblp},
booktitle = {CNS},
crossref = {conf/cns/2020},
ee = {https://doi.org/10.1109/CNS48642.2020.9162256},
interhash = {f27c653ad68828626400baec8c289645},
intrahash = {f6d930e0c8760917154abe687c1238e5},
isbn = {978-1-7281-4760-4},
keywords = {dblp},
pages = {1-10},
publisher = {IEEE},
timestamp = {2024-04-10T19:05:38.000+0200},
title = {SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs.},
url = {http://dblp.uni-trier.de/db/conf/cns/cns2020.html#SoroushAMIMGFRB20},
year = 2020
}