The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "MIST@CCS"( http://dblp.L3S.de/Venues/MIST@CCS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ccs

Publication years (Num. hits)
2015 (13) 2016 (16) 2017 (14)
Publication types (Num. hits)
inproceedings(40) proceedings(3)
Venues (Conferences, Journals, ...)
MIST@CCS(43)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 43 publication records. Showing 43 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Hassan Takabi, Jafar Haadi Jafarian Insider Threat Mitigation Using Moving Target Defense and Deception. Search on Bibsonomy MIST@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mookyu Park, Junwoo Seo, Kyoungmin Kim 0001, Moosung Park, Kyungho Lee Criminal Minds: Reasoning Prime Suspect in Russian Hacking Scandal by Perspective of Insiders. Search on Bibsonomy MIST@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vishal Sharma 0001, Ilsun You, Gökhan Kul Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain. Search on Bibsonomy MIST@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nir Drucker, Shay Gueron Combining Homomorphic Encryption with Trusted Execution Environment: A Demonstration with Paillier Encryption and SGX. Search on Bibsonomy MIST@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gökhan Kul, Shambhu J. Upadhyaya, Andrew Hughes Complexity of Insider Attacks to Databases. Search on Bibsonomy MIST@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Matt Shockley, Chris Maixner, Ryan V. Johnson, Mitch DeRidder, W. Michael Petullo Using VisorFlow to Control Information Flow without Modifying the Operating System Kernel or its Userspace. Search on Bibsonomy MIST@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alexander Hartl, Robert Annessi, Tanja Zseby A Subliminal Channel in EdDSA: Information Leakage with High-Speed Signatures. Search on Bibsonomy MIST@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yassir Hashem, Hassan Takabi, Ram Dantu, Rodney D. Nielsen A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats. Search on Bibsonomy MIST@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kim-Kwang Raymond Choo Research Challenges and Opportunities in Big Forensic Data. Search on Bibsonomy MIST@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shih-Chieh Su Behavior Prediction over Summarized Network Activities. Search on Bibsonomy MIST@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pablo Moriano, Jared Pendleton, Steven Rich, L. Jean Camp Insider Threat Event Detection in User-System Interactions. Search on Bibsonomy MIST@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Athul Harilal, Flavio Toffalini, John Henry Castellanos, Juan Guarnizo, Ivan Homoliak, Martín Ochoa TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. Search on Bibsonomy MIST@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Antonis Michalas, Rohan Murray MemTri: A Memory Forensics Triage Tool Using Bayesian Network and Volatility. Search on Bibsonomy MIST@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017 Search on Bibsonomy MIST@CCS The full citation details ... 2017 DBLP  BibTeX  RDF
1Tabish Rashid, Ioannis Agrafiotis, Jason R. C. Nurse A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models. Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Fulvio Valenza, Marco Vallini, Antonio Lioy Online and Offline Security Policy Assessment. Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Kyungroul Lee, Hyeungjun Yeuk, Kangbin Yim, Suhyun Kim Analysis on Manipulation of the MAC Address and Consequent Security Threats. Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Noam Shalev, Idit Keidar, Yosef Moatti, Yaron Weinsberg WatchIT: Who Watches Your IT Guy? Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Peter Mell, James M. Shook, Serban I. Gavrila Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems. Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Simon Parkin, Andrew Fielder, Alex Ashby Pragmatic Security: Modelling IT Security Management Responsibilities for SME Archetypes. Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Yvo Desmedt, Arash Shaghaghi Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor. Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Fei Song 0001, Wei Quan 0001, Tianming Zhao, Hongke Zhang, Ziwei Hu, Ilsun You Ports Distribution Management for Privacy Protection inside Local Domain Name System. Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Markus Wurzenberger, Florian Skopik, Roman Fiedler, Wolfgang Kastner Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools. Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese A Tripwire Grammar for Insider Threat Detection. Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Ilsun You, Elisa Bertino (eds.) Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016 Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohamed Yassine Naghmouchi, Nancy Perrot, Nizar Kheir, Ali Ridha Mahjoub, Jean-Philippe Wary A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems. Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Florian Kammueller, Manfred Kerber, Christian W. Probst Towards Formal Analysis of Insider Threats for Auctions. Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Stefan Achleitner, Thomas La Porta, Patrick D. McDaniel, Shridatt Sugrim, Srikanth V. Krishnamurthy, Ritu Chadha Cyber Deception: Virtual Networks to Defend Insider Reconnaissance. Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Wafa Ben Jaballah, Nizar Kheir A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications. Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Ryan V. Johnson, Jessie Lass, W. Michael Petullo Studying Naive Users and the Insider Threat with SimpleFlow. Search on Bibsonomy MIST@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Aniello Castiglione, Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri 0002, Raffaele Pizzolante Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence. Search on Bibsonomy MIST@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sherenaz W. Al-Haj Baddar, Alessio Merlo, Mauro Migliardi SKETURE: A Sketch-based Packet Analysis Tool. Search on Bibsonomy MIST@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yessir Hashem, Hassan Takabi, Mohammad GhasemiGol, Ram Dantu Towards Insider Threat Detection Using Psychophysiological Signals. Search on Bibsonomy MIST@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alessandro Armando, Gianluca Bocci, Gabriele Costa 0001, Rocco Mammoliti, Alessio Merlo, Silvio Ranise, Riccardo Traverso, Andrea Valenza Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module. Search on Bibsonomy MIST@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andrew Stephen McGough, David Wall, John Brennan, Georgios Theodoropoulos 0001, Ed Ruck-Keene, Budi Arief, Carl Gamble, John S. Fitzgerald, Aad P. A. van Moorsel, Sujeewa Alwis Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). Search on Bibsonomy MIST@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kangbin Yim, Aniello Castiglione, Jeong Hyun Yi, Mauro Migliardi, Ilsun You Cyber Threats to Industrial Control Systems. Search on Bibsonomy MIST@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kun Lin Tsai, Mengyuan Ye, Fang-Yie Leu Secure Power Management Scheme for WSN. Search on Bibsonomy MIST@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gökhan Kul, Shambhu J. Upadhyaya A Preliminary Cyber Ontology for Insider Threats in the Financial Sector. Search on Bibsonomy MIST@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1William Austin Casey, Quanyan Zhu, Jose Andre Morales, Bud Mishra Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games. Search on Bibsonomy MIST@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gaurang Gavai, Kumar Sricharan, Dave Gunning, Rob Rolleston, John Hanley, Mudita Singhal Detecting Insider Threat from Enterprise Social and Online Activity Data. Search on Bibsonomy MIST@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nicolas David 0002, Alexandre David, René Rydhof Hansen, Kim Guldstrand Larsen, Axel Legay, Mads Chr. Olesen, Christian W. Probst Modelling Social-Technical Attacks with Timed Automata. Search on Bibsonomy MIST@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Ilsun You (eds.) Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015 Search on Bibsonomy MIST@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1William R. Claycomb Detecting Insider Threats: Who Is Winning the Game? Search on Bibsonomy MIST@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #43 of 43 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license