[{"quality_controlled":"1","publication_identifier":{"issn":["1540-7993","1558-4046"]},"publication_status":"published","issue":"1","year":"2024","page":"69-72","intvolume":"        22","citation":{"short":"E. Bodden, J. Pottebaum, M. Fockel, I. Gräßler, IEEE Security &#38; Privacy 22 (2024) 69–72.","bibtex":"@article{Bodden_Pottebaum_Fockel_Gräßler_2024, title={Evaluating Security Through Isolation and Defense in Depth}, volume={22}, DOI={<a href=\"https://doi.org/10.1109/msec.2023.3336028\">10.1109/msec.2023.3336028</a>}, number={1}, journal={IEEE Security &#38; Privacy}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Bodden, Eric and Pottebaum, Jens and Fockel, Markus and Gräßler, Iris}, year={2024}, pages={69–72} }","mla":"Bodden, Eric, et al. “Evaluating Security Through Isolation and Defense in Depth.” <i>IEEE Security &#38; Privacy</i>, vol. 22, no. 1, Institute of Electrical and Electronics Engineers (IEEE), 2024, pp. 69–72, doi:<a href=\"https://doi.org/10.1109/msec.2023.3336028\">10.1109/msec.2023.3336028</a>.","apa":"Bodden, E., Pottebaum, J., Fockel, M., &#38; Gräßler, I. (2024). Evaluating Security Through Isolation and Defense in Depth. <i>IEEE Security &#38; Privacy</i>, <i>22</i>(1), 69–72. <a href=\"https://doi.org/10.1109/msec.2023.3336028\">https://doi.org/10.1109/msec.2023.3336028</a>","ama":"Bodden E, Pottebaum J, Fockel M, Gräßler I. Evaluating Security Through Isolation and Defense in Depth. <i>IEEE Security &#38; Privacy</i>. 2024;22(1):69-72. doi:<a href=\"https://doi.org/10.1109/msec.2023.3336028\">10.1109/msec.2023.3336028</a>","ieee":"E. Bodden, J. Pottebaum, M. Fockel, and I. Gräßler, “Evaluating Security Through Isolation and Defense in Depth,” <i>IEEE Security &#38; Privacy</i>, vol. 22, no. 1, pp. 69–72, 2024, doi: <a href=\"https://doi.org/10.1109/msec.2023.3336028\">10.1109/msec.2023.3336028</a>.","chicago":"Bodden, Eric, Jens Pottebaum, Markus Fockel, and Iris Gräßler. “Evaluating Security Through Isolation and Defense in Depth.” <i>IEEE Security &#38; Privacy</i> 22, no. 1 (2024): 69–72. <a href=\"https://doi.org/10.1109/msec.2023.3336028\">https://doi.org/10.1109/msec.2023.3336028</a>."},"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","date_updated":"2026-03-31T02:19:49Z","volume":22,"author":[{"orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256","first_name":"Eric"},{"first_name":"Jens","orcid":"http://orcid.org/0000-0001-8778-2989","last_name":"Pottebaum","id":"405","full_name":"Pottebaum, Jens"},{"first_name":"Markus","last_name":"Fockel","orcid":"0000-0002-1269-0702","id":"8472","full_name":"Fockel, Markus"},{"first_name":"Iris","id":"47565","full_name":"Gräßler, Iris","last_name":"Gräßler","orcid":"0000-0001-5765-971X"}],"date_created":"2024-03-15T20:16:18Z","title":"Evaluating Security Through Isolation and Defense in Depth","doi":"10.1109/msec.2023.3336028","main_file_link":[{"url":"https://ieeexplore.ieee.org/document/10411721"}],"publication":"IEEE Security & Privacy","type":"journal_article","status":"public","_id":"52587","department":[{"_id":"152"},{"_id":"76"},{"_id":"662"}],"user_id":"405","keyword":["Law","Electrical and Electronic Engineering","Computer Networks and Communications"],"language":[{"iso":"eng"}]},{"type":"journal_article","publication":"IEEE Security &amp; Privacy","status":"public","user_id":"15249","department":[{"_id":"76"}],"_id":"53952","language":[{"iso":"eng"}],"issue":"5","publication_status":"published","publication_identifier":{"issn":["1540-7993","1558-4046"]},"citation":{"apa":"Massacci, F., Sabetta, A., Mirkovic, J., Murray, T., Okhravi, H., Mannan, M., Rocha, A., Bodden, E., &#38; Geer, D. E. (2022). “Free” as in Freedom to Protest? <i>IEEE Security &#38;amp; Privacy</i>, <i>20</i>(5), 16–21. <a href=\"https://doi.org/10.1109/msec.2022.3185845\">https://doi.org/10.1109/msec.2022.3185845</a>","short":"F. Massacci, A. Sabetta, J. Mirkovic, T. Murray, H. Okhravi, M. Mannan, A. Rocha, E. Bodden, D.E. Geer, IEEE Security &#38;amp; Privacy 20 (2022) 16–21.","mla":"Massacci, Fabio, et al. “‘Free’ as in Freedom to Protest?” <i>IEEE Security &#38;amp; Privacy</i>, vol. 20, no. 5, Institute of Electrical and Electronics Engineers (IEEE), 2022, pp. 16–21, doi:<a href=\"https://doi.org/10.1109/msec.2022.3185845\">10.1109/msec.2022.3185845</a>.","bibtex":"@article{Massacci_Sabetta_Mirkovic_Murray_Okhravi_Mannan_Rocha_Bodden_Geer_2022, title={“Free” as in Freedom to Protest?}, volume={20}, DOI={<a href=\"https://doi.org/10.1109/msec.2022.3185845\">10.1109/msec.2022.3185845</a>}, number={5}, journal={IEEE Security &#38;amp; Privacy}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Massacci, Fabio and Sabetta, Antonino and Mirkovic, Jelena and Murray, Toby and Okhravi, Hamed and Mannan, Mohammad and Rocha, Anderson and Bodden, Eric and Geer, Daniel E.}, year={2022}, pages={16–21} }","chicago":"Massacci, Fabio, Antonino Sabetta, Jelena Mirkovic, Toby Murray, Hamed Okhravi, Mohammad Mannan, Anderson Rocha, Eric Bodden, and Daniel E. Geer. “‘Free’ as in Freedom to Protest?” <i>IEEE Security &#38;amp; Privacy</i> 20, no. 5 (2022): 16–21. <a href=\"https://doi.org/10.1109/msec.2022.3185845\">https://doi.org/10.1109/msec.2022.3185845</a>.","ieee":"F. Massacci <i>et al.</i>, “‘Free’ as in Freedom to Protest?,” <i>IEEE Security &#38;amp; Privacy</i>, vol. 20, no. 5, pp. 16–21, 2022, doi: <a href=\"https://doi.org/10.1109/msec.2022.3185845\">10.1109/msec.2022.3185845</a>.","ama":"Massacci F, Sabetta A, Mirkovic J, et al. “Free” as in Freedom to Protest? <i>IEEE Security &#38;amp; Privacy</i>. 2022;20(5):16-21. doi:<a href=\"https://doi.org/10.1109/msec.2022.3185845\">10.1109/msec.2022.3185845</a>"},"page":"16-21","intvolume":"        20","year":"2022","author":[{"full_name":"Massacci, Fabio","last_name":"Massacci","first_name":"Fabio"},{"first_name":"Antonino","last_name":"Sabetta","full_name":"Sabetta, Antonino"},{"first_name":"Jelena","last_name":"Mirkovic","full_name":"Mirkovic, Jelena"},{"first_name":"Toby","full_name":"Murray, Toby","last_name":"Murray"},{"first_name":"Hamed","last_name":"Okhravi","full_name":"Okhravi, Hamed"},{"first_name":"Mohammad","full_name":"Mannan, Mohammad","last_name":"Mannan"},{"first_name":"Anderson","last_name":"Rocha","full_name":"Rocha, Anderson"},{"full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"},{"first_name":"Daniel E.","full_name":"Geer, Daniel E.","last_name":"Geer"}],"date_created":"2024-05-06T11:32:59Z","volume":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","date_updated":"2024-05-06T11:33:14Z","doi":"10.1109/msec.2022.3185845","title":"“Free” as in Freedom to Protest?"},{"publication":"IEEE Security & Privacy","type":"journal_article","status":"public","_id":"12003","department":[{"_id":"589"}],"user_id":"49154","language":[{"iso":"eng"}],"publication_identifier":{"issn":["1540-7993"]},"publication_status":"published","year":"2014","page":"77-79","citation":{"apa":"Eckhoff, D., &#38; Sommer, C. (2014). Driving for Big Data? Privacy Concerns in Vehicular Networking. <i>IEEE Security &#38; Privacy</i>, 77–79. <a href=\"https://doi.org/10.1109/msp.2014.2\">https://doi.org/10.1109/msp.2014.2</a>","bibtex":"@article{Eckhoff_Sommer_2014, title={Driving for Big Data? Privacy Concerns in Vehicular Networking}, DOI={<a href=\"https://doi.org/10.1109/msp.2014.2\">10.1109/msp.2014.2</a>}, journal={IEEE Security &#38; Privacy}, author={Eckhoff, David and Sommer, Christoph}, year={2014}, pages={77–79} }","mla":"Eckhoff, David, and Christoph Sommer. “Driving for Big Data? Privacy Concerns in Vehicular Networking.” <i>IEEE Security &#38; Privacy</i>, 2014, pp. 77–79, doi:<a href=\"https://doi.org/10.1109/msp.2014.2\">10.1109/msp.2014.2</a>.","short":"D. Eckhoff, C. Sommer, IEEE Security &#38; Privacy (2014) 77–79.","ama":"Eckhoff D, Sommer C. Driving for Big Data? Privacy Concerns in Vehicular Networking. <i>IEEE Security &#38; Privacy</i>. 2014:77-79. doi:<a href=\"https://doi.org/10.1109/msp.2014.2\">10.1109/msp.2014.2</a>","chicago":"Eckhoff, David, and Christoph Sommer. “Driving for Big Data? Privacy Concerns in Vehicular Networking.” <i>IEEE Security &#38; Privacy</i>, 2014, 77–79. <a href=\"https://doi.org/10.1109/msp.2014.2\">https://doi.org/10.1109/msp.2014.2</a>.","ieee":"D. Eckhoff and C. Sommer, “Driving for Big Data? Privacy Concerns in Vehicular Networking,” <i>IEEE Security &#38; Privacy</i>, pp. 77–79, 2014."},"date_updated":"2022-01-06T06:51:15Z","date_created":"2019-07-18T09:52:43Z","author":[{"first_name":"David","full_name":"Eckhoff, David","last_name":"Eckhoff"},{"orcid":"0000-0002-4336-7350","last_name":"Sommer","id":"49154","full_name":"Sommer, Christoph","first_name":"Christoph"}],"title":"Driving for Big Data? Privacy Concerns in Vehicular Networking","doi":"10.1109/msp.2014.2"}]
