[{"dc":{"language":["eng"],"type":["info:eu-repo/semantics/conferenceObject","doc-type:conferenceObject","text","http://purl.org/coar/resource_type/c_5794"],"rights":["info:eu-repo/semantics/closedAccess"],"publisher":["{USENIX} Association"],"title":["Analysis of DTLS Implementations Using Protocol State Fuzzing"],"creator":["Fiterau-Brostean, Paul","Jonsson, Bengt","Merget, Robert","de Ruiter, Joeri","Sagonas, Konstantinos","Somorovsky, Juraj"],"source":["Fiterau-Brostean P, Jonsson B, Merget R, de Ruiter J, Sagonas K, Somorovsky J. Analysis of DTLS Implementations Using Protocol State Fuzzing. In: 29th {USENIX} Security Symposium ({USENIX} Security 20). {USENIX} Association; 2020:2523-2540."],"identifier":["https://ris.uni-paderborn.de/record/25334"],"relation":["info:eu-repo/semantics/altIdentifier/isbn/978-1-939133-17-5"],"date":["2020"]},"user_id":"83504","author":[{"first_name":"Paul","last_name":"Fiterau-Brostean"},{"last_name":"Jonsson","first_name":"Bengt"},{"first_name":"Robert","last_name":"Merget"},{"first_name":"Joeri","last_name":"de Ruiter"},{"last_name":"Sagonas","first_name":"Konstantinos"},{"id":"83504","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","first_name":"Juraj"}],"department":[{"tree":[{"_id":"7"},{"_id":"34"},{"_id":"44"},{"_id":"43"}],"_id":"632"}],"publication":"29th {USENIX} Security Symposium ({USENIX} Security 20)","status":"public","date_created":"2021-10-04T18:56:41Z","dini_type":"doc-type:conferenceObject","publication_identifier":{"isbn":[]},"_id":"25334","date_updated":"2022-01-06T06:57:01Z","creator":{"id":"83504","login":"jurajs"},"language":[{}],"citation":{"ieee":"P. Fiterau-Brostean, B. Jonsson, R. Merget, J. de Ruiter, K. Sagonas, and J. Somorovsky, “Analysis of DTLS Implementations Using Protocol State Fuzzing,” in 29th {USENIX} Security Symposium ({USENIX} Security 20), 2020, pp. 2523–2540.","short":"P. Fiterau-Brostean, B. Jonsson, R. Merget, J. de Ruiter, K. Sagonas, J. Somorovsky, in: 29th {USENIX} Security Symposium ({USENIX} Security 20), {USENIX} Association, 2020, pp. 2523–2540.","mla":"Fiterau-Brostean, Paul, et al. “Analysis of DTLS Implementations Using Protocol State Fuzzing.” 29th {USENIX} Security Symposium ({USENIX} Security 20), {USENIX} Association, 2020, pp. 2523–40.","bibtex":"@inproceedings{Fiterau-Brostean_Jonsson_Merget_de Ruiter_Sagonas_Somorovsky_2020, title={Analysis of DTLS Implementations Using Protocol State Fuzzing}, booktitle={29th {USENIX} Security Symposium ({USENIX} Security 20)}, publisher={{USENIX} Association}, author={Fiterau-Brostean, Paul and Jonsson, Bengt and Merget, Robert and de Ruiter, Joeri and Sagonas, Konstantinos and Somorovsky, Juraj}, year={2020}, pages={2523–2540} }","chicago":"Fiterau-Brostean, Paul, Bengt Jonsson, Robert Merget, Joeri de Ruiter, Konstantinos Sagonas, and Juraj Somorovsky. “Analysis of DTLS Implementations Using Protocol State Fuzzing.” In 29th {USENIX} Security Symposium ({USENIX} Security 20), 2523–40. {USENIX} Association, 2020.","apa":"Fiterau-Brostean, P., Jonsson, B., Merget, R., de Ruiter, J., Sagonas, K., & Somorovsky, J. (2020). Analysis of DTLS Implementations Using Protocol State Fuzzing. 29th {USENIX} Security Symposium ({USENIX} Security 20), 2523–2540."},"type":"conference","page":"2523-2540","uri_base":"https://ris.uni-paderborn.de"}]