default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/insider-threats2010.bht:"
@inproceedings{DBLP:conf/ccs/AkavipatDK010, author = {Ruj Akavipat and Apurv Dhadphale and Apu Kapadia and Matthew Wright}, editor = {Ehab Al{-}Shaer and Brent Lagesse and Craig A. Shue}, title = {ReDS: reputation for directory services in {P2P} systems}, booktitle = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010}, pages = {47--54}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866886.1866896}, doi = {10.1145/1866886.1866896}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AkavipatDK010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Cappelli10, author = {Dawn M. Cappelli}, editor = {Ehab Al{-}Shaer and Brent Lagesse and Craig A. Shue}, title = {Using empirical insider threat case data to design a mitigation strategy}, booktitle = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010}, pages = {1--2}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866886.1866888}, doi = {10.1145/1866886.1866888}, timestamp = {Thu, 17 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Cappelli10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ClaycombS10, author = {William R. Claycomb and Dongwan Shin}, editor = {Ehab Al{-}Shaer and Brent Lagesse and Craig A. Shue}, title = {Detecting insider activity using enhanced directory virtualization}, booktitle = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010}, pages = {29--36}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866886.1866894}, doi = {10.1145/1866886.1866894}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ClaycombS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GafnySRE10, author = {Ma'ayan Gafny and Asaf Shabtai and Lior Rokach and Yuval Elovici}, editor = {Ehab Al{-}Shaer and Brent Lagesse and Craig A. Shue}, title = {Detecting data misuse by applying context-based data linkage}, booktitle = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010}, pages = {3--12}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866886.1866890}, doi = {10.1145/1866886.1866890}, timestamp = {Thu, 17 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GafnySRE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HarelSRE10, author = {Amir Harel and Asaf Shabtai and Lior Rokach and Yuval Elovici}, editor = {Ehab Al{-}Shaer and Brent Lagesse and Craig A. Shue}, title = {M-score: estimating the potential damage of data leakage incident by assigning misuseability weight}, booktitle = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010}, pages = {13--20}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866886.1866891}, doi = {10.1145/1866886.1866891}, timestamp = {Thu, 17 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HarelSRE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NellikarNC10, author = {Suraj Nellikar and David M. Nicol and Jai J. Choi}, editor = {Ehab Al{-}Shaer and Brent Lagesse and Craig A. Shue}, title = {Role-based differentiation for insider detection algorithms}, booktitle = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010}, pages = {55--62}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866886.1866897}, doi = {10.1145/1866886.1866897}, timestamp = {Thu, 17 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NellikarNC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StefanovA10, author = {Emil Stefanov and Mikhail J. Atallah}, editor = {Ehab Al{-}Shaer and Brent Lagesse and Craig A. Shue}, title = {Duress detection for authentication attacks against multiple administrators}, booktitle = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010}, pages = {37--46}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866886.1866895}, doi = {10.1145/1866886.1866895}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/StefanovA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TuttleWLL10, author = {John Tuttle and Robert J. Walls and Erik G. Learned{-}Miller and Brian Neil Levine}, editor = {Ehab Al{-}Shaer and Brent Lagesse and Craig A. Shue}, title = {Reverse engineering for mobile systems forensics with Ares}, booktitle = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010}, pages = {21--28}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866886.1866892}, doi = {10.1145/1866886.1866892}, timestamp = {Thu, 17 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TuttleWLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2010insider-threats, editor = {Ehab Al{-}Shaer and Brent Lagesse and Craig A. Shue}, title = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866886}, doi = {10.1145/1866886}, isbn = {978-1-4503-0092-6}, timestamp = {Thu, 17 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2010insider-threats.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.