


default search action
7th MIST@CCS 2015: Denver, Colorado, USA
- Elisa Bertino, Ilsun You:
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3824-0
Session 1: Regular Paper Session
- Andrew Stephen McGough
, David Wall, John Brennan
, Georgios Theodoropoulos
, Ed Ruck-Keene, Budi Arief
, Carl Gamble, John S. Fitzgerald
, Aad P. A. van Moorsel, Sujeewa Alwis:
Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). 1-12 - Gaurang Gavai, Kumar Sricharan, Dave Gunning, Rob Rolleston, John Hanley, Mudita Singhal:
Detecting Insider Threat from Enterprise Social and Online Activity Data. 13-20 - Nicolas David, Alexandre David, René Rydhof Hansen
, Kim Guldstrand Larsen
, Axel Legay, Mads Chr. Olesen, Christian W. Probst
:
Modelling Social-Technical Attacks with Timed Automata. 21-28 - Aniello Castiglione
, Arcangelo Castiglione
, Alfredo De Santis
, Barbara Masucci, Francesco Palmieri
, Raffaele Pizzolante:
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence. 29-39 - Alessandro Armando
, Gianluca Bocci, Gabriele Costa
, Rocco Mammoliti, Alessio Merlo, Silvio Ranise
, Riccardo Traverso, Andrea Valenza
:
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module. 41-49
Session 2: Keynote Address
- William R. Claycomb:
Detecting Insider Threats: Who Is Winning the Game? 51
Session 3: Best Paper & Poster Session
- William Austin Casey, Quanyan Zhu, Jose Andre Morales, Bud Mishra:
Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games. 53-62 - Kun Lin Tsai
, Mengyuan Ye, Fang-Yie Leu:
Secure Power Management Scheme for WSN. 63-66 - Sherenaz W. Al-Haj Baddar, Alessio Merlo, Mauro Migliardi
:
SKETURE: A Sketch-based Packet Analysis Tool. 67-70 - Yessir Hashem, Hassan Takabi, Mohammad GhasemiGol
, Ram Dantu:
Towards Insider Threat Detection Using Psychophysiological Signals. 71-74 - Gökhan Kul
, Shambhu J. Upadhyaya:
A Preliminary Cyber Ontology for Insider Threats in the Financial Sector. 75-78
Session 4: Panel Discussion
- Kangbin Yim, Aniello Castiglione
, Jeong Hyun Yi
, Mauro Migliardi
, Ilsun You:
Cyber Threats to Industrial Control Systems. 79-81

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.