default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/mist2017.bht:"
@inproceedings{DBLP:conf/ccs/Choo17, author = {Kim{-}Kwang Raymond Choo}, title = {Research Challenges and Opportunities in Big Forensic Data}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {79--80}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139931}, doi = {10.1145/3139923.3139931}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Choo17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DruckerG17, author = {Nir Drucker and Shay Gueron}, title = {Combining Homomorphic Encryption with Trusted Execution Environment: {A} Demonstration with Paillier Encryption and {SGX}}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {85--88}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139933}, doi = {10.1145/3139923.3139933}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DruckerG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HarilalTCGHO17, author = {Athul Harilal and Flavio Toffalini and John Henry Castellanos and Juan Guarnizo and Ivan Homoliak and Mart{\'{\i}}n Ochoa}, title = {{TWOS:} {A} Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {45--56}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139929}, doi = {10.1145/3139923.3139929}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HarilalTCGHO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HartlAZ17, author = {Alexander Hartl and Robert Annessi and Tanja Zseby}, title = {A Subliminal Channel in EdDSA: Information Leakage with High-Speed Signatures}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {67--78}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139925}, doi = {10.1145/3139923.3139925}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HartlAZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HashemTDN17, author = {Yassir Hashem and Hassan Takabi and Ram Dantu and Rodney D. Nielsen}, title = {A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {33--44}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139930}, doi = {10.1145/3139923.3139930}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HashemTDN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KulUH17, author = {G{\"{o}}khan Kul and Shambhu J. Upadhyaya and Andrew Hughes}, title = {Complexity of Insider Attacks to Databases}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {25--32}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139927}, doi = {10.1145/3139923.3139927}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KulUH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MichalasM17a, author = {Antonis Michalas and Rohan Murray}, title = {MemTri: {A} Memory Forensics Triage Tool Using Bayesian Network and Volatility}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {57--66}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139926}, doi = {10.1145/3139923.3139926}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MichalasM17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MorianoPRC17, author = {Pablo Moriano and Jared Pendleton and Steven Rich and L. Jean Camp}, title = {Insider Threat Event Detection in User-System Interactions}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1--12}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139928}, doi = {10.1145/3139923.3139928}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MorianoPRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ParkSKPL17, author = {Mookyu Park and Junwoo Seo and Kyoungmin Kim and Moosung Park and Kyungho Lee}, title = {Criminal Minds: Reasoning Prime Suspect in Russian Hacking Scandal by Perspective of Insiders}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {97--100}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139936}, doi = {10.1145/3139923.3139936}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ParkSKPL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SharmaYK17, author = {Vishal Sharma and Ilsun You and G{\"{o}}khan Kul}, title = {Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {81--84}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139932}, doi = {10.1145/3139923.3139932}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SharmaYK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShockleyMJDP17, author = {Matt Shockley and Chris Maixner and Ryan V. Johnson and Mitch DeRidder and W. Michael Petullo}, title = {Using VisorFlow to Control Information Flow without Modifying the Operating System Kernel or its Userspace}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {13--24}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139924}, doi = {10.1145/3139923.3139924}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShockleyMJDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Su17, author = {Shih{-}Chieh Su}, title = {Behavior Prediction over Summarized Network Activities}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {89--92}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139934}, doi = {10.1145/3139923.3139934}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Su17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TakabiJ17, author = {Hassan Takabi and Jafar Haadi Jafarian}, title = {Insider Threat Mitigation Using Moving Target Defense and Deception}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {93--96}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139935}, doi = {10.1145/3139923.3139935}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TakabiJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2017mist, title = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, publisher = {{ACM}}, year = {2017}, url = {http://dl.acm.org/citation.cfm?id=3139923}, isbn = {978-1-4503-5177-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2017mist.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.