default search action
Insider Threats@CCS 2010: Chicago, Illinois, USA
- Ehab Al-Shaer, Brent Lagesse, Craig A. Shue:
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010. ACM 2010, ISBN 978-1-4503-0092-6
Keynote
- Dawn M. Cappelli:
Using empirical insider threat case data to design a mitigation strategy. 1-2
Characterizing data risks
- Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Detecting data misuse by applying context-based data linkage. 3-12 - Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici:
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight. 13-20 - John Tuttle, Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine:
Reverse engineering for mobile systems forensics with Ares. 21-28
Session 2
- William R. Claycomb, Dongwan Shin:
Detecting insider activity using enhanced directory virtualization. 29-36 - Emil Stefanov, Mikhail J. Atallah:
Duress detection for authentication attacks against multiple administrators. 37-46 - Ruj Akavipat, Apurv Dhadphale, Apu Kapadia, Matthew Wright:
ReDS: reputation for directory services in P2P systems. 47-54 - Suraj Nellikar, David M. Nicol, Jai J. Choi:
Role-based differentiation for insider detection algorithms. 55-62
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.