{"_id":"RxPFciMJyGp4deT2j","bibbaseid":"fallon-keeney-mcfadden-quilty-vandermeer-usingthecompaautonomousarchitectureformobilenetworksecurity-2017","author_short":["Fallon, L.","Keeney, J.","McFadden, M.","Quilty, J. M.","van der Meer, S."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2022-03-05T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Fallon"],"firstnames":["Liam"],"suffixes":[]},{"propositions":[],"lastnames":["Keeney"],"firstnames":["John"],"suffixes":[]},{"propositions":[],"lastnames":["McFadden"],"firstnames":["Mark"],"suffixes":[]},{"propositions":[],"lastnames":["Quilty"],"firstnames":["John","M."],"suffixes":[]},{"propositions":["van","der"],"lastnames":["Meer"],"firstnames":["Sven"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/29fc1d941a5d6250c681554be3ccb7cfc/dblp","booktitle":"IM","crossref":"conf/im/2017","ee":"https://doi.org/10.23919/INM.2017.7987370","interhash":"89f76335a5c6d8008e5465bda197300c","intrahash":"9fc1d941a5d6250c681554be3ccb7cfc","isbn":"978-3-901882-89-0","keywords":"dblp","pages":"747-753","publisher":"IEEE","timestamp":"2024-04-10T10:21:33.000+0200","title":"Using the COMPA autonomous architecture for mobile network security.","url":"http://dblp.uni-trier.de/db/conf/im/im2017.html#FallonKMQM17","year":"2017","bibtex":"@inproceedings{conf/im/FallonKMQM17,\n added-at = {2022-03-05T00:00:00.000+0100},\n author = {Fallon, Liam and Keeney, John and McFadden, Mark and Quilty, John M. and van der Meer, Sven},\n biburl = {https://www.bibsonomy.org/bibtex/29fc1d941a5d6250c681554be3ccb7cfc/dblp},\n booktitle = {IM},\n crossref = {conf/im/2017},\n ee = {https://doi.org/10.23919/INM.2017.7987370},\n interhash = {89f76335a5c6d8008e5465bda197300c},\n intrahash = {9fc1d941a5d6250c681554be3ccb7cfc},\n isbn = {978-3-901882-89-0},\n keywords = {dblp},\n pages = {747-753},\n publisher = {IEEE},\n timestamp = {2024-04-10T10:21:33.000+0200},\n title = {Using the COMPA autonomous architecture for mobile network security.},\n url = {http://dblp.uni-trier.de/db/conf/im/im2017.html#FallonKMQM17},\n year = 2017\n}\n\n","author_short":["Fallon, L.","Keeney, J.","McFadden, M.","Quilty, J. M.","van der Meer, S."],"key":"conf/im/FallonKMQM17","id":"conf/im/FallonKMQM17","bibbaseid":"fallon-keeney-mcfadden-quilty-vandermeer-usingthecompaautonomousarchitectureformobilenetworksecurity-2017","role":"author","urls":{"Link":"https://doi.org/10.23919/INM.2017.7987370","Paper":"http://dblp.uni-trier.de/db/conf/im/im2017.html#FallonKMQM17"},"keyword":["dblp"],"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/mcfadden?items=1000","dataSources":["jLSDGmQ5hirjxv54Q","zkL7TWEoxHM9BDAAH"],"keywords":["dblp"],"search_terms":["using","compa","autonomous","architecture","mobile","network","security","fallon","keeney","mcfadden","quilty","van der meer"],"title":"Using the COMPA autonomous architecture for mobile network security.","year":2017}