BibTeX records: Asmaa Sallam

download as .bib file

@inproceedings{DBLP:conf/icde/FadolalkarimBS20,
  author       = {Daren Fadolalkarim and
                  Elisa Bertino and
                  Asmaa Sallam},
  title        = {An Anomaly Detection System for the Protection of Relational Database
                  Systems against Data Leakage by Application Programs},
  booktitle    = {36th {IEEE} International Conference on Data Engineering, {ICDE} 2020,
                  Dallas, TX, USA, April 20-24, 2020},
  pages        = {265--276},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICDE48307.2020.00030},
  doi          = {10.1109/ICDE48307.2020.00030},
  timestamp    = {Fri, 05 Jun 2020 17:54:38 +0200},
  biburl       = {https://dblp.org/rec/conf/icde/FadolalkarimBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/SallamB19,
  author       = {Asmaa Sallam and
                  Elisa Bertino},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {Result-Based Detection of Insider Threats to Relational Databases},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {133--143},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300039},
  doi          = {10.1145/3292006.3300039},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/SallamB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/SallamB18,
  author       = {Asmaa Sallam and
                  Elisa Bertino},
  title        = {Detection of Temporal Data Ex-Filtration Threats to Relational Databases},
  booktitle    = {4th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2018, Philadelphia, PA, USA, October 18-20, 2018},
  pages        = {146--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CIC.2018.00030},
  doi          = {10.1109/CIC.2018.00030},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/SallamB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SallamB18,
  author       = {Asmaa Sallam and
                  Elisa Bertino},
  editor       = {Seraphin B. Calo and
                  Elisa Bertino and
                  Dinesh C. Verma},
  title        = {Techniques and Systems for Anomaly Detection in Database Systems},
  booktitle    = {Policy-Based Autonomic Data Governance [extended papers from the Second
                  International Workshop on Policy-based Autonomic Data Governance,
                  PADG@ESORICS 2018, September 6, 2018, Barcelona, Spain]},
  series       = {Lecture Notes in Computer Science},
  volume       = {11550},
  pages        = {113--133},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17277-0\_7},
  doi          = {10.1007/978-3-030-17277-0\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SallamB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/SallamBHLLS17,
  author       = {Asmaa Sallam and
                  Elisa Bertino and
                  Syed Rafiul Hussain and
                  David Landers and
                  Robert Michael Lefler and
                  Donald Steiner},
  title        = {{DBSAFE} - An Anomaly Detection System to Protect Databases From Exfiltration
                  Attempts},
  journal      = {{IEEE} Syst. J.},
  volume       = {11},
  number       = {2},
  pages        = {483--493},
  year         = {2017},
  url          = {https://doi.org/10.1109/JSYST.2015.2487221},
  doi          = {10.1109/JSYST.2015.2487221},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/SallamBHLLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/SallamB17,
  author       = {Asmaa Sallam and
                  Elisa Bertino},
  title        = {Detection of Temporal Insider Threats to Relational Databases},
  booktitle    = {3rd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017},
  pages        = {406--415},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CIC.2017.00058},
  doi          = {10.1109/CIC.2017.00058},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/SallamB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/widm/SallamFBX16,
  author       = {Asmaa Sallam and
                  Daren Fadolalkarim and
                  Elisa Bertino and
                  Qian Xiao},
  title        = {Data and syntax centric anomaly detection for relational databases},
  journal      = {WIREs Data Mining Knowl. Discov.},
  volume       = {6},
  number       = {6},
  pages        = {231--239},
  year         = {2016},
  url          = {https://doi.org/10.1002/widm.1195},
  doi          = {10.1002/WIDM.1195},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/widm/SallamFBX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/FadolalkarimSB16,
  author       = {Daren Fadolalkarim and
                  Asmaa Sallam and
                  Elisa Bertino},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {{PANDDE:} Provenance-based ANomaly Detection of Data Exfiltration},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {267--276},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857710},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/FadolalkarimSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/SallamXBF16,
  author       = {Asmaa Sallam and
                  Qian Xiao and
                  Elisa Bertino and
                  Daren Fadolalkarim},
  title        = {Anomaly Detection Techniques for Database Protection Against Insider
                  Threats (Invited Paper)},
  booktitle    = {17th {IEEE} International Conference on Information Reuse and Integration,
                  {IRI} 2016, Pittsburgh, PA, USA, July 28-30, 2016},
  pages        = {20--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/IRI.2016.12},
  doi          = {10.1109/IRI.2016.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/SallamXBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/HussainSB15,
  author       = {Syed Rafiul Hussain and
                  Asmaa Sallam and
                  Elisa Bertino},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {DetAnom: Detecting Anomalous Database Transactions by Insiders},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {25--35},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699111},
  doi          = {10.1145/2699026.2699111},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/HussainSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/Seo0SBY14,
  author       = {Seung{-}Hyun Seo and
                  Aditi Gupta and
                  Asmaa Mohamed Sallam and
                  Elisa Bertino and
                  Kangbin Yim},
  title        = {Detecting mobile malware threats to homeland security through static
                  analysis},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {38},
  pages        = {43--53},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jnca.2013.05.008},
  doi          = {10.1016/J.JNCA.2013.05.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/Seo0SBY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SallamB14,
  author       = {Asmaa Sallam and
                  Elisa Bertino},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{POSTER:} Protecting Against Data Exfiltration Insider Attacks Through
                  Application Programs},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1493--1495},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662384},
  doi          = {10.1145/2660267.2662384},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SallamB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/ShebaroSKB13,
  author       = {Bilal Shebaro and
                  Asmaa Sallam and
                  Ashish Kamra and
                  Elisa Bertino},
  editor       = {Giovanna Guerrini and
                  Norman W. Paton},
  title        = {PostgreSQL anomalous query detector},
  booktitle    = {Joint 2013 {EDBT/ICDT} Conferences, {EDBT} '13 Proceedings, Genoa,
                  Italy, March 18-22, 2013},
  pages        = {741--744},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2452376.2452469},
  doi          = {10.1145/2452376.2452469},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edbt/ShebaroSKB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/AlySGNAOG12,
  author       = {Ahmed M. Aly and
                  Asmaa Sallam and
                  Bala M. Gnanasekaran and
                  Long{-}Van Nguyen{-}Dinh and
                  Walid G. Aref and
                  Mourad Ouzzani and
                  Arif Ghafoor},
  editor       = {Anastasios Kementsietsidis and
                  Marcos Antonio Vaz Salles},
  title        = {{M3:} Stream Processing on Main-Memory MapReduce},
  booktitle    = {{IEEE} 28th International Conference on Data Engineering {(ICDE} 2012),
                  Washington, DC, {USA} (Arlington, Virginia), 1-5 April, 2012},
  pages        = {1253--1256},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDE.2012.120},
  doi          = {10.1109/ICDE.2012.120},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/AlySGNAOG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics