Search dblp for Publications

export results for "toc:db/conf/ccs/mist2017.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/Choo17,
  author       = {Kim{-}Kwang Raymond Choo},
  title        = {Research Challenges and Opportunities in Big Forensic Data},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {79--80},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139931},
  doi          = {10.1145/3139923.3139931},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Choo17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DruckerG17,
  author       = {Nir Drucker and
                  Shay Gueron},
  title        = {Combining Homomorphic Encryption with Trusted Execution Environment:
                  {A} Demonstration with Paillier Encryption and {SGX}},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {85--88},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139933},
  doi          = {10.1145/3139923.3139933},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DruckerG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HarilalTCGHO17,
  author       = {Athul Harilal and
                  Flavio Toffalini and
                  John Henry Castellanos and
                  Juan Guarnizo and
                  Ivan Homoliak and
                  Mart{\'{\i}}n Ochoa},
  title        = {{TWOS:} {A} Dataset of Malicious Insider Threat Behavior Based on
                  a Gamified Competition},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139929},
  doi          = {10.1145/3139923.3139929},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HarilalTCGHO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HartlAZ17,
  author       = {Alexander Hartl and
                  Robert Annessi and
                  Tanja Zseby},
  title        = {A Subliminal Channel in EdDSA: Information Leakage with High-Speed
                  Signatures},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {67--78},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139925},
  doi          = {10.1145/3139923.3139925},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HartlAZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HashemTDN17,
  author       = {Yassir Hashem and
                  Hassan Takabi and
                  Ram Dantu and
                  Rodney D. Nielsen},
  title        = {A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {33--44},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139930},
  doi          = {10.1145/3139923.3139930},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HashemTDN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KulUH17,
  author       = {G{\"{o}}khan Kul and
                  Shambhu J. Upadhyaya and
                  Andrew Hughes},
  title        = {Complexity of Insider Attacks to Databases},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {25--32},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139927},
  doi          = {10.1145/3139923.3139927},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KulUH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MichalasM17a,
  author       = {Antonis Michalas and
                  Rohan Murray},
  title        = {MemTri: {A} Memory Forensics Triage Tool Using Bayesian Network and
                  Volatility},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {57--66},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139926},
  doi          = {10.1145/3139923.3139926},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MichalasM17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MorianoPRC17,
  author       = {Pablo Moriano and
                  Jared Pendleton and
                  Steven Rich and
                  L. Jean Camp},
  title        = {Insider Threat Event Detection in User-System Interactions},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139928},
  doi          = {10.1145/3139923.3139928},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MorianoPRC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ParkSKPL17,
  author       = {Mookyu Park and
                  Junwoo Seo and
                  Kyoungmin Kim and
                  Moosung Park and
                  Kyungho Lee},
  title        = {Criminal Minds: Reasoning Prime Suspect in Russian Hacking Scandal
                  by Perspective of Insiders},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {97--100},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139936},
  doi          = {10.1145/3139923.3139936},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ParkSKPL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SharmaYK17,
  author       = {Vishal Sharma and
                  Ilsun You and
                  G{\"{o}}khan Kul},
  title        = {Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless
                  Networks using Blockchain},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {81--84},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139932},
  doi          = {10.1145/3139923.3139932},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SharmaYK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShockleyMJDP17,
  author       = {Matt Shockley and
                  Chris Maixner and
                  Ryan V. Johnson and
                  Mitch DeRidder and
                  W. Michael Petullo},
  title        = {Using VisorFlow to Control Information Flow without Modifying the
                  Operating System Kernel or its Userspace},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139924},
  doi          = {10.1145/3139923.3139924},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShockleyMJDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Su17,
  author       = {Shih{-}Chieh Su},
  title        = {Behavior Prediction over Summarized Network Activities},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {89--92},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139934},
  doi          = {10.1145/3139923.3139934},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Su17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TakabiJ17,
  author       = {Hassan Takabi and
                  Jafar Haadi Jafarian},
  title        = {Insider Threat Mitigation Using Moving Target Defense and Deception},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {93--96},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139935},
  doi          = {10.1145/3139923.3139935},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TakabiJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017mist,
  title        = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {http://dl.acm.org/citation.cfm?id=3139923},
  isbn         = {978-1-4503-5177-5},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2017mist.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}