Search dblp for Publications

export results for "toc:db/series/ais/ais39.bht:"

 download as .bib file

@incollection{DBLP:series/ais/Bellovin08,
  author       = {Steven M. Bellovin},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {The Insider Attack Problem Nature and Scope},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_1},
  doi          = {10.1007/978-0-387-77322-3\_1},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Bellovin08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/GligorC08,
  author       = {Virgil D. Gligor and
                  C. Sekar Chandersekaran},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Surviving Insider Attacks: {A} Call for System Experiments},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {153--164},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_9},
  doi          = {10.1007/978-0-387-77322-3\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/GligorC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Hunker08,
  author       = {Jeffrey Hunker},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Taking Stock and Looking Forward - An Outsider's Perspective on the
                  Insider Threat},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {195--214},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_11},
  doi          = {10.1007/978-0-387-77322-3\_11},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Hunker08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/IyerDNK08,
  author       = {Ravishankar K. Iyer and
                  Paul Dabrowski and
                  Nithin Nakka and
                  Zbigniew Kalbarczyk},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Reconfigurable Tamper-resistant Hardware Support Against Insider Threats:
                  The Trusted {ILLIAC} Approach},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {133--152},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_8},
  doi          = {10.1007/978-0-387-77322-3\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/IyerDNK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Keromytis08,
  author       = {Angelos D. Keromytis},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Hard Problems and Research Challenges},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {215--218},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_12},
  doi          = {10.1007/978-0-387-77322-3\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Keromytis08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Keromytis08a,
  author       = {Angelos D. Keromytis},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Hard Problems and Research Challenges Concluding Remarks},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {219--222},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_13},
  doi          = {10.1007/978-0-387-77322-3\_13},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Keromytis08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KillourhyM08,
  author       = {Kevin S. Killourhy and
                  Roy A. Maxion},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {91--112},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_6},
  doi          = {10.1007/978-0-387-77322-3\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KillourhyM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/McCormick08,
  author       = {Michael McCormick},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Data Theft: {A} Prototypical Insider Threat},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {53--68},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_4},
  doi          = {10.1007/978-0-387-77322-3\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/McCormick08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/MooreCT08,
  author       = {Andrew P. Moore and
                  Dawn M. Cappelli and
                  Randall F. Trzeciak},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {The "Big Picture" of Insider {IT} Sabotage Across {U.S.} Critical
                  Infrastructures},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {17--52},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_3},
  doi          = {10.1007/978-0-387-77322-3\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/MooreCT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Pfleeger08,
  author       = {Charles P. Pfleeger},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Reflections on the Insider Threat},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {5--16},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_2},
  doi          = {10.1007/978-0-387-77322-3\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Pfleeger08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SahitaS08,
  author       = {Ravi Sahita and
                  Uday R. Savagaonkar},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Towards a Virtualization-enabled Framework for Information Traceability
                  {(VFIT)}},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {113--132},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_7},
  doi          = {10.1007/978-0-387-77322-3\_7},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SahitaS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SalemHS08,
  author       = {Malek Ben Salem and
                  Shlomo Hershkop and
                  Salvatore J. Stolfo},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {A Survey of Insider Attack Detection Research},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {69--90},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_5},
  doi          = {10.1007/978-0-387-77322-3\_5},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SalemHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SinclairS08,
  author       = {Sara Sinclair and
                  Sean W. Smith},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Preventative Directions For Insider Threat Mitigation Via Access Control},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {165--194},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_10},
  doi          = {10.1007/978-0-387-77322-3\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SinclairS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/39,
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3},
  doi          = {10.1007/978-0-387-77322-3},
  isbn         = {978-0-387-77321-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/39.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}