default search action
33rd SP 2012: San Francisco, California, USA - Workshops
- 2012 IEEE Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2157-0
TrustED 2012
- Rishab Nithyanand, John Solis:
A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem. 1-11 - Marc Joye:
A Method for Preventing "Skipping" Attacks. 12-15 - Christina Boura, Sylvain Lévêque, David Vigilant:
Side-Channel Analysis of Grøstl and Skein. 16-26 - Markku-Juhani O. Saarinen:
The BlueJay Ultra-Lightweight Hybrid Cryptosystem. 27-32 - Mehrdad Majzoobi, Masoud Rostami, Farinaz Koushanfar, Dan S. Wallach, Srinivas Devadas:
Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching. 33-44
WSCS 2012
- Matthew Burkholder, Rachel Greenstadt:
Privacy in Online Review Sites. 45-52 - Sharon Paradesi, Oshani Seneviratne, Lalana Kagal:
Policy Aware Social Miner. 53-59 - Mathieu Jaume:
Semantic Comparison of Security Policies: From Access Control Policies to Flow Properties. 60-67 - Christopher Griffin, Kathleen A. Moore:
A Framework for Modeling Decision Making and Deception with Semantic Information. 68-74 - Sumit More, Mary Matthews, Anupam Joshi, Tim Finin:
A Knowledge-Based Approach to Intrusion Detection Modeling. 75-81 - Dibyajyoti Ghosh, Anupam Joshi, Tim Finin, Pramod Jagtap:
Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context Modeling. 82-85 - Jim Blythe, L. Jean Camp:
Implementing Mental Models. 86-90 - Hilarie Orman:
Towards a Semantics of Phish. 91-96 - Hao Zhang, William Banick, Danfeng Yao, Naren Ramakrishnan:
User Intention-Based Traffic Dependence Analysis for Anomaly Detection. 104-112 - Christopher Griffin, Anna Cinzia Squicciarini:
Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results. 113-116
WRIT 2012
- Alexander Y. Liu, Dung N. Lam:
Using Consensus Clustering for Multi-view Anomaly Detection. 117-124 - Salvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis:
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. 125-128 - Jonathan Voris, Nathaniel Boggs, Salvatore J. Stolfo:
Lost in Translation: Improving Decoy Documents via Automated Translation. 129-133 - Youngho Cho, Gang Qu, Yuanming Wu:
Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks. 134-141 - Oliver Brdiczka, Juan Liu, Bob Price, Jianqiang Shen, Akshay Patil, Richard Chow, Eugene Bart, Nicolas Ducheneaut:
Proactive Insider Threat Detection through Graph Learning and Psychological Context. 142-149 - Fred Cohen:
Forensic Methods for Detecting Insider Turning Behaviors. 150-158 - John P. Murphy, Vincent H. Berk, Ian D. Gregorio-De Souza:
Decision Support Procedure in the Insider Threat Domain. 159-163
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.