default search action
SafeConfig 2014: Scottsdale, Arizona, USA
- Ehab Al-Shaer, Krishna Kant:
Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014. ACM 2014, ISBN 978-1-4503-3147-0
Keynote on Future Research Direction on Security Analytics
- Carl A. Gunter:
Detecting Roles and Anomalies in Hospital Access Audit Logs. 1
Security Analytics for Sense Making (Long Papers)
- Ping Chen, Nick Nikiforakis, Lieven Desmet, Christophe Huygens:
Security Analysis of the Chinese Web: How well is it protected? 3-9 - Fida Gillani, Ehab Al-Shaer:
Improving Efficiency of Spam Detection using Economic Model. 11-18 - Jeremy Tate, T. Charles Clancy:
Secure and Tamper Proof Code Management. 19-24
Analytics for Automated Mitigation (Short Papers)
- Mohammed Noraden Alsaleh, Ehab Al-Shaer:
Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring Systems. 25-28 - Kun Sun, Sushil Jajodia:
Protecting Enterprise Networks through Attack Surface Expansion. 29-32 - Yasuyuki Tanaka, Atsuhiro Goto:
n-ROPdetector: Proposal of a Method to Detect the ROP Attack Code on the Network. 33-36
Panel
- Lujo Bauer:
Human Factors, Defaults, and Automation: Challenges and Opporunities. 37
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.