{"publication_status":"published","publisher":"ACM","date_updated":"2024-01-27T15:28:22Z","citation":{"short":"J. Rossel, V. Mladenov, J. Somorovsky, in: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, ACM, 2023.","ama":"Rossel J, Mladenov V, Somorovsky J. Security Analysis of the 3MF Data Format. In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. ACM; 2023. doi:10.1145/3607199.3607216","apa":"Rossel, J., Mladenov, V., & Somorovsky, J. (2023). Security Analysis of the 3MF Data Format. Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. 26th International Symposium on Research in Attacks, Intrusions and Defenses, Hongkong. https://doi.org/10.1145/3607199.3607216","bibtex":"@inproceedings{Rossel_Mladenov_Somorovsky_2023, title={Security Analysis of the 3MF Data Format}, DOI={10.1145/3607199.3607216}, booktitle={Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses}, publisher={ACM}, author={Rossel, Jost and Mladenov, Vladislav and Somorovsky, Juraj}, year={2023} }","ieee":"J. Rossel, V. Mladenov, and J. Somorovsky, “Security Analysis of the 3MF Data Format,” presented at the 26th International Symposium on Research in Attacks, Intrusions and Defenses, Hongkong, 2023, doi: 10.1145/3607199.3607216.","chicago":"Rossel, Jost, Vladislav Mladenov, and Juraj Somorovsky. “Security Analysis of the 3MF Data Format.” In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. ACM, 2023. https://doi.org/10.1145/3607199.3607216.","mla":"Rossel, Jost, et al. “Security Analysis of the 3MF Data Format.” Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, ACM, 2023, doi:10.1145/3607199.3607216."},"file_date_updated":"2023-10-16T03:48:08Z","status":"public","main_file_link":[{"url":"https://dl.acm.org/doi/abs/10.1145/3607199.3607216"}],"conference":{"location":"Hongkong","end_date":"2023-10-18","start_date":"2023-10-16","name":"26th International Symposium on Research in Attacks, Intrusions and Defenses"},"publication":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses","department":[{"_id":"632"}],"year":"2023","has_accepted_license":"1","language":[{"iso":"eng"}],"_id":"48012","ddc":["000"],"doi":"10.1145/3607199.3607216","file":[{"creator":"jrossel","file_size":1054999,"access_level":"closed","date_updated":"2023-10-16T03:48:08Z","content_type":"application/pdf","file_name":"Security_Analysis_of_the_3mf_Data_Format.pdf","date_created":"2023-10-16T03:48:08Z","relation":"main_file","file_id":"48065","success":1}],"date_created":"2023-10-11T13:42:09Z","type":"conference","author":[{"full_name":"Rossel, Jost","orcid":"0000-0002-3182-4059","last_name":"Rossel","first_name":"Jost","id":"58331"},{"first_name":"Vladislav","full_name":"Mladenov, Vladislav","last_name":"Mladenov"},{"id":"83504","first_name":"Juraj","full_name":"Somorovsky, Juraj","orcid":"0000-0002-3593-7720","last_name":"Somorovsky"}],"title":"Security Analysis of the 3MF Data Format","user_id":"58331"}