{"_id":"RxPFciMJyGp4deT2j","bibbaseid":"fallon-keeney-mcfadden-quilty-vandermeer-usingthecompaautonomousarchitectureformobilenetworksecurity-2017","author_short":["Fallon, L.","Keeney, J.","McFadden, M.","Quilty, J.","van der Meer, S."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2019-10-19T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Fallon"],"firstnames":["Liam"],"suffixes":[]},{"propositions":[],"lastnames":["Keeney"],"firstnames":["John"],"suffixes":[]},{"propositions":[],"lastnames":["McFadden"],"firstnames":["Mark"],"suffixes":[]},{"propositions":[],"lastnames":["Quilty"],"firstnames":["John"],"suffixes":[]},{"propositions":["van","der"],"lastnames":["Meer"],"firstnames":["Sven"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/204d9dc8cd38226508acaacc6f48ea04d/dblp","booktitle":"IM","crossref":"conf/im/2017","ee":"https://doi.org/10.23919/INM.2017.7987370","interhash":"89f76335a5c6d8008e5465bda197300c","intrahash":"04d9dc8cd38226508acaacc6f48ea04d","isbn":"978-3-901882-89-0","keywords":"dblp","pages":"747-753","publisher":"IEEE","timestamp":"2019-10-22T15:51:09.000+0200","title":"Using the COMPA autonomous architecture for mobile network security.","url":"http://dblp.uni-trier.de/db/conf/im/im2017.html#FallonKMQM17","year":"2017","bibtex":"@inproceedings{conf/im/FallonKMQM17,\n added-at = {2019-10-19T00:00:00.000+0200},\n author = {Fallon, Liam and Keeney, John and McFadden, Mark and Quilty, John and van der Meer, Sven},\n biburl = {https://www.bibsonomy.org/bibtex/204d9dc8cd38226508acaacc6f48ea04d/dblp},\n booktitle = {IM},\n crossref = {conf/im/2017},\n ee = {https://doi.org/10.23919/INM.2017.7987370},\n interhash = {89f76335a5c6d8008e5465bda197300c},\n intrahash = {04d9dc8cd38226508acaacc6f48ea04d},\n isbn = {978-3-901882-89-0},\n keywords = {dblp},\n pages = {747-753},\n publisher = {IEEE},\n timestamp = {2019-10-22T15:51:09.000+0200},\n title = {Using the COMPA autonomous architecture for mobile network security.},\n url = {http://dblp.uni-trier.de/db/conf/im/im2017.html#FallonKMQM17},\n year = 2017\n}\n\n","author_short":["Fallon, L.","Keeney, J.","McFadden, M.","Quilty, J.","van der Meer, S."],"key":"conf/im/FallonKMQM17","id":"conf/im/FallonKMQM17","bibbaseid":"fallon-keeney-mcfadden-quilty-vandermeer-usingthecompaautonomousarchitectureformobilenetworksecurity-2017","role":"author","urls":{"Link":"https://doi.org/10.23919/INM.2017.7987370","Paper":"http://dblp.uni-trier.de/db/conf/im/im2017.html#FallonKMQM17"},"keyword":["dblp"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/van meer?items=1000","dataSources":["jLSDGmQ5hirjxv54Q"],"keywords":["dblp"],"search_terms":["using","compa","autonomous","architecture","mobile","network","security","fallon","keeney","mcfadden","quilty","van der meer"],"title":"Using the COMPA autonomous architecture for mobile network security.","year":2017}