Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Asmaa Sallam
@inproceedings{DBLP:conf/icde/FadolalkarimBS20, author = {Daren Fadolalkarim and Elisa Bertino and Asmaa Sallam}, title = {An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs}, booktitle = {36th {IEEE} International Conference on Data Engineering, {ICDE} 2020, Dallas, TX, USA, April 20-24, 2020}, pages = {265--276}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDE48307.2020.00030}, doi = {10.1109/ICDE48307.2020.00030}, timestamp = {Fri, 05 Jun 2020 17:54:38 +0200}, biburl = {https://dblp.org/rec/conf/icde/FadolalkarimBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/SallamB19, author = {Asmaa Sallam and Elisa Bertino}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {Result-Based Detection of Insider Threats to Relational Databases}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {133--143}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3300039}, doi = {10.1145/3292006.3300039}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/SallamB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/SallamB18, author = {Asmaa Sallam and Elisa Bertino}, title = {Detection of Temporal Data Ex-Filtration Threats to Relational Databases}, booktitle = {4th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2018, Philadelphia, PA, USA, October 18-20, 2018}, pages = {146--155}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CIC.2018.00030}, doi = {10.1109/CIC.2018.00030}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/SallamB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SallamB18, author = {Asmaa Sallam and Elisa Bertino}, editor = {Seraphin B. Calo and Elisa Bertino and Dinesh C. Verma}, title = {Techniques and Systems for Anomaly Detection in Database Systems}, booktitle = {Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, PADG@ESORICS 2018, September 6, 2018, Barcelona, Spain]}, series = {Lecture Notes in Computer Science}, volume = {11550}, pages = {113--133}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17277-0\_7}, doi = {10.1007/978-3-030-17277-0\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SallamB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/SallamBHLLS17, author = {Asmaa Sallam and Elisa Bertino and Syed Rafiul Hussain and David Landers and Robert Michael Lefler and Donald Steiner}, title = {{DBSAFE} - An Anomaly Detection System to Protect Databases From Exfiltration Attempts}, journal = {{IEEE} Syst. J.}, volume = {11}, number = {2}, pages = {483--493}, year = {2017}, url = {https://doi.org/10.1109/JSYST.2015.2487221}, doi = {10.1109/JSYST.2015.2487221}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/SallamBHLLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/SallamB17, author = {Asmaa Sallam and Elisa Bertino}, title = {Detection of Temporal Insider Threats to Relational Databases}, booktitle = {3rd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017}, pages = {406--415}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CIC.2017.00058}, doi = {10.1109/CIC.2017.00058}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/SallamB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/widm/SallamFBX16, author = {Asmaa Sallam and Daren Fadolalkarim and Elisa Bertino and Qian Xiao}, title = {Data and syntax centric anomaly detection for relational databases}, journal = {WIREs Data Mining Knowl. Discov.}, volume = {6}, number = {6}, pages = {231--239}, year = {2016}, url = {https://doi.org/10.1002/widm.1195}, doi = {10.1002/WIDM.1195}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/widm/SallamFBX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/FadolalkarimSB16, author = {Daren Fadolalkarim and Asmaa Sallam and Elisa Bertino}, editor = {Elisa Bertino and Ravi S. Sandhu and Alexander Pretschner}, title = {{PANDDE:} Provenance-based ANomaly Detection of Data Exfiltration}, booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March 9-11, 2016}, pages = {267--276}, publisher = {{ACM}}, year = {2016}, url = {https://dl.acm.org/citation.cfm?id=2857710}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/FadolalkarimSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/SallamXBF16, author = {Asmaa Sallam and Qian Xiao and Elisa Bertino and Daren Fadolalkarim}, title = {Anomaly Detection Techniques for Database Protection Against Insider Threats (Invited Paper)}, booktitle = {17th {IEEE} International Conference on Information Reuse and Integration, {IRI} 2016, Pittsburgh, PA, USA, July 28-30, 2016}, pages = {20--29}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/IRI.2016.12}, doi = {10.1109/IRI.2016.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/SallamXBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/HussainSB15, author = {Syed Rafiul Hussain and Asmaa Sallam and Elisa Bertino}, editor = {Jaehong Park and Anna Cinzia Squicciarini}, title = {DetAnom: Detecting Anomalous Database Transactions by Insiders}, booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015}, pages = {25--35}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2699026.2699111}, doi = {10.1145/2699026.2699111}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/HussainSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Seo0SBY14, author = {Seung{-}Hyun Seo and Aditi Gupta and Asmaa Mohamed Sallam and Elisa Bertino and Kangbin Yim}, title = {Detecting mobile malware threats to homeland security through static analysis}, journal = {J. Netw. Comput. Appl.}, volume = {38}, pages = {43--53}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.05.008}, doi = {10.1016/J.JNCA.2013.05.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/Seo0SBY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SallamB14, author = {Asmaa Sallam and Elisa Bertino}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Protecting Against Data Exfiltration Insider Attacks Through Application Programs}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1493--1495}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662384}, doi = {10.1145/2660267.2662384}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SallamB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/ShebaroSKB13, author = {Bilal Shebaro and Asmaa Sallam and Ashish Kamra and Elisa Bertino}, editor = {Giovanna Guerrini and Norman W. Paton}, title = {PostgreSQL anomalous query detector}, booktitle = {Joint 2013 {EDBT/ICDT} Conferences, {EDBT} '13 Proceedings, Genoa, Italy, March 18-22, 2013}, pages = {741--744}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2452376.2452469}, doi = {10.1145/2452376.2452469}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edbt/ShebaroSKB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/AlySGNAOG12, author = {Ahmed M. Aly and Asmaa Sallam and Bala M. Gnanasekaran and Long{-}Van Nguyen{-}Dinh and Walid G. Aref and Mourad Ouzzani and Arif Ghafoor}, editor = {Anastasios Kementsietsidis and Marcos Antonio Vaz Salles}, title = {{M3:} Stream Processing on Main-Memory MapReduce}, booktitle = {{IEEE} 28th International Conference on Data Engineering {(ICDE} 2012), Washington, DC, {USA} (Arlington, Virginia), 1-5 April, 2012}, pages = {1253--1256}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICDE.2012.120}, doi = {10.1109/ICDE.2012.120}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/AlySGNAOG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.