default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/mist2015.bht:"
@inproceedings{DBLP:conf/ccs/ArmandoBCMMRTV15, author = {Alessandro Armando and Gianluca Bocci and Gabriele Costa and Rocco Mammoliti and Alessio Merlo and Silvio Ranise and Riccardo Traverso and Andrea Valenza}, editor = {Elisa Bertino and Ilsun You}, title = {Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {41--49}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808786}, doi = {10.1145/2808783.2808786}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ArmandoBCMMRTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BaddarMM15, author = {Sherenaz W. Al{-}Haj Baddar and Alessio Merlo and Mauro Migliardi}, editor = {Elisa Bertino and Ilsun You}, title = {{SKETURE:} {A} Sketch-based Packet Analysis Tool}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {67--70}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808791}, doi = {10.1145/2808783.2808791}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BaddarMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaseyZMM15, author = {William Austin Casey and Quanyan Zhu and Jose Andre Morales and Bud Mishra}, editor = {Elisa Bertino and Ilsun You}, title = {Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {53--62}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808788}, doi = {10.1145/2808783.2808788}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaseyZMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CastiglioneCSMP15, author = {Aniello Castiglione and Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci and Francesco Palmieri and Raffaele Pizzolante}, editor = {Elisa Bertino and Ilsun You}, title = {Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {29--39}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808789}, doi = {10.1145/2808783.2808789}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CastiglioneCSMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Claycomb15, author = {William R. Claycomb}, editor = {Elisa Bertino and Ilsun You}, title = {Detecting Insider Threats: Who Is Winning the Game?}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {51}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808794}, doi = {10.1145/2808783.2808794}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Claycomb15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DavidDHLLOP15, author = {Nicolas David and Alexandre David and Ren{\'{e}} Rydhof Hansen and Kim Guldstrand Larsen and Axel Legay and Mads Chr. Olesen and Christian W. Probst}, editor = {Elisa Bertino and Ilsun You}, title = {Modelling Social-Technical Attacks with Timed Automata}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {21--28}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808787}, doi = {10.1145/2808783.2808787}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DavidDHLLOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GavaiSGRHS15, author = {Gaurang Gavai and Kumar Sricharan and Dave Gunning and Rob Rolleston and John Hanley and Mudita Singhal}, editor = {Elisa Bertino and Ilsun You}, title = {Detecting Insider Threat from Enterprise Social and Online Activity Data}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {13--20}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808784}, doi = {10.1145/2808783.2808784}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GavaiSGRHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HashemTGD15, author = {Yessir Hashem and Hassan Takabi and Mohammad GhasemiGol and Ram Dantu}, editor = {Elisa Bertino and Ilsun You}, title = {Towards Insider Threat Detection Using Psychophysiological Signals}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {71--74}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808792}, doi = {10.1145/2808783.2808792}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HashemTGD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KulU15, author = {G{\"{o}}khan Kul and Shambhu J. Upadhyaya}, editor = {Elisa Bertino and Ilsun You}, title = {A Preliminary Cyber Ontology for Insider Threats in the Financial Sector}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {75--78}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808793}, doi = {10.1145/2808783.2808793}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KulU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/McGoughWBTRAGFM15, author = {Andrew Stephen McGough and David Wall and John Brennan and Georgios Theodoropoulos and Ed Ruck{-}Keene and Budi Arief and Carl Gamble and John S. Fitzgerald and Aad P. A. van Moorsel and Sujeewa Alwis}, editor = {Elisa Bertino and Ilsun You}, title = {Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware)}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {1--12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808785}, doi = {10.1145/2808783.2808785}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/McGoughWBTRAGFM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TsaiYL15, author = {Kun Lin Tsai and Mengyuan Ye and Fang{-}Yie Leu}, editor = {Elisa Bertino and Ilsun You}, title = {Secure Power Management Scheme for {WSN}}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {63--66}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808790}, doi = {10.1145/2808783.2808790}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TsaiYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YimCYMY15, author = {Kangbin Yim and Aniello Castiglione and Jeong Hyun Yi and Mauro Migliardi and Ilsun You}, editor = {Elisa Bertino and Ilsun You}, title = {Cyber Threats to Industrial Control Systems}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {79--81}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808795}, doi = {10.1145/2808783.2808795}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YimCYMY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2015mist, editor = {Elisa Bertino and Ilsun You}, title = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783}, doi = {10.1145/2808783}, isbn = {978-1-4503-3824-0}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2015mist.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.