-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathexample_bibliography.bib
42 lines (40 loc) · 1.77 KB
/
example_bibliography.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
@inproceedings{DBLP:conf/leet/CheckowaySR10,
author = {Stephen Checkoway and
Hovav Shacham and
Eric Rescorla},
title = {Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to
Pwn Your Computer},
booktitle = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
{LEET} '10},
year = {2010},
crossref = {DBLP:conf/leet/2010},
url = {https://www.usenix.org/conference/leet-10/are-text-only-data-formats-safe-or-use-latex-class-file-pwn-your-computer},
timestamp = {Thu, 22 May 2014 18:21:56 +0200},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/leet/CheckowaySR10},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/leet/2010,
editor = {Michael Bailey},
title = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
{LEET} '10},
address = {San Jose, CA, USA},
publisher = {{USENIX} Association},
year = {2010},
url = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A35},
timestamp = {Thu, 22 May 2014 18:20:01 +0200},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/leet/2010},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:books/sp/Gratzer16,
author = {George Gr{\"{a}}tzer},
title = {More Math Into LaTeX},
edition = {5},
publisher = {Springer},
year = {2016},
url = {http://dx.doi.org/10.1007/978-3-319-23796-1},
doi = {10.1007/978-3-319-23796-1},
isbn = {978-3-319-23795-4},
timestamp = {Tue, 16 Feb 2016 13:59:25 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/books/sp/Gratzer16},
bibsource = {dblp computer science bibliography, http://dblp.org}
}