Pareto Optimal Security Resource Allocation for Internet of Things. Rullo, A., Midi, D., Serra, E., & Bertino, E. ACM Trans. Priv. Secur., 20(4):15:1–15:30, 2017. Paper doi bibtex @article{DBLP:journals/tissec/RulloMSB17,
author = {Antonino Rullo and
Daniele Midi and
Edoardo Serra and
Elisa Bertino},
title = {Pareto Optimal Security Resource Allocation for Internet of Things},
journal = {{ACM} Trans. Priv. Secur.},
volume = {20},
number = {4},
pages = {15:1--15:30},
year = {2017},
url = {https://doi.org/10.1145/3139293},
doi = {10.1145/3139293},
timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tissec/RulloMSB17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"Gp7nDeri9jj8pmZvi","bibbaseid":"rullo-midi-serra-bertino-paretooptimalsecurityresourceallocationforinternetofthings-2017","author_short":["Rullo, A.","Midi, D.","Serra, E.","Bertino, E."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Antonino"],"propositions":[],"lastnames":["Rullo"],"suffixes":[]},{"firstnames":["Daniele"],"propositions":[],"lastnames":["Midi"],"suffixes":[]},{"firstnames":["Edoardo"],"propositions":[],"lastnames":["Serra"],"suffixes":[]},{"firstnames":["Elisa"],"propositions":[],"lastnames":["Bertino"],"suffixes":[]}],"title":"Pareto Optimal Security Resource Allocation for Internet of Things","journal":"ACM Trans. Priv. Secur.","volume":"20","number":"4","pages":"15:1–15:30","year":"2017","url":"https://doi.org/10.1145/3139293","doi":"10.1145/3139293","timestamp":"Mon, 26 Oct 2020 00:00:00 +0100","biburl":"https://dblp.org/rec/journals/tissec/RulloMSB17.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/tissec/RulloMSB17,\n author = {Antonino Rullo and\n Daniele Midi and\n Edoardo Serra and\n Elisa Bertino},\n title = {Pareto Optimal Security Resource Allocation for Internet of Things},\n journal = {{ACM} Trans. Priv. Secur.},\n volume = {20},\n number = {4},\n pages = {15:1--15:30},\n year = {2017},\n url = {https://doi.org/10.1145/3139293},\n doi = {10.1145/3139293},\n timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/tissec/RulloMSB17.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Rullo, A.","Midi, D.","Serra, E.","Bertino, E."],"key":"DBLP:journals/tissec/RulloMSB17","id":"DBLP:journals/tissec/RulloMSB17","bibbaseid":"rullo-midi-serra-bertino-paretooptimalsecurityresourceallocationforinternetofthings-2017","role":"author","urls":{"Paper":"https://doi.org/10.1145/3139293"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"http://dblp.org/pers/tb2/s/Serra:Edoardo","dataSources":["7rWgxyuseebjFdqAR"],"keywords":[],"search_terms":["pareto","optimal","security","resource","allocation","internet","things","rullo","midi","serra","bertino"],"title":"Pareto Optimal Security Resource Allocation for Internet of Things","year":2017}