Search dblp for Publications

export results for "toc:db/conf/ccs/mist2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/ArmandoBCMMRTV15,
  author       = {Alessandro Armando and
                  Gianluca Bocci and
                  Gabriele Costa and
                  Rocco Mammoliti and
                  Alessio Merlo and
                  Silvio Ranise and
                  Riccardo Traverso and
                  Andrea Valenza},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {41--49},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808786},
  doi          = {10.1145/2808783.2808786},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmandoBCMMRTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BaddarMM15,
  author       = {Sherenaz W. Al{-}Haj Baddar and
                  Alessio Merlo and
                  Mauro Migliardi},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {{SKETURE:} {A} Sketch-based Packet Analysis Tool},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {67--70},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808791},
  doi          = {10.1145/2808783.2808791},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BaddarMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaseyZMM15,
  author       = {William Austin Casey and
                  Quanyan Zhu and
                  Jose Andre Morales and
                  Bud Mishra},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Compliance Control: Managed Vulnerability Surface in Social-Technological
                  Systems via Signaling Games},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {53--62},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808788},
  doi          = {10.1145/2808783.2808788},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaseyZMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CastiglioneCSMP15,
  author       = {Aniello Castiglione and
                  Arcangelo Castiglione and
                  Alfredo De Santis and
                  Barbara Masucci and
                  Francesco Palmieri and
                  Raffaele Pizzolante},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Novel Insider Threat Techniques: Automation and Generation of Ad Hoc
                  Digital Evidence},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {29--39},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808789},
  doi          = {10.1145/2808783.2808789},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CastiglioneCSMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Claycomb15,
  author       = {William R. Claycomb},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Detecting Insider Threats: Who Is Winning the Game?},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {51},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808794},
  doi          = {10.1145/2808783.2808794},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Claycomb15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DavidDHLLOP15,
  author       = {Nicolas David and
                  Alexandre David and
                  Ren{\'{e}} Rydhof Hansen and
                  Kim Guldstrand Larsen and
                  Axel Legay and
                  Mads Chr. Olesen and
                  Christian W. Probst},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Modelling Social-Technical Attacks with Timed Automata},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {21--28},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808787},
  doi          = {10.1145/2808783.2808787},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DavidDHLLOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GavaiSGRHS15,
  author       = {Gaurang Gavai and
                  Kumar Sricharan and
                  Dave Gunning and
                  Rob Rolleston and
                  John Hanley and
                  Mudita Singhal},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Detecting Insider Threat from Enterprise Social and Online Activity
                  Data},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {13--20},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808784},
  doi          = {10.1145/2808783.2808784},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GavaiSGRHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HashemTGD15,
  author       = {Yessir Hashem and
                  Hassan Takabi and
                  Mohammad GhasemiGol and
                  Ram Dantu},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Towards Insider Threat Detection Using Psychophysiological Signals},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {71--74},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808792},
  doi          = {10.1145/2808783.2808792},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HashemTGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KulU15,
  author       = {G{\"{o}}khan Kul and
                  Shambhu J. Upadhyaya},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {A Preliminary Cyber Ontology for Insider Threats in the Financial
                  Sector},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {75--78},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808793},
  doi          = {10.1145/2808783.2808793},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KulU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McGoughWBTRAGFM15,
  author       = {Andrew Stephen McGough and
                  David Wall and
                  John Brennan and
                  Georgios Theodoropoulos and
                  Ed Ruck{-}Keene and
                  Budi Arief and
                  Carl Gamble and
                  John S. Fitzgerald and
                  Aad P. A. van Moorsel and
                  Sujeewa Alwis},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous
                  Systems Using Beneficial Intelligent Software (Ben-ware)},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808785},
  doi          = {10.1145/2808783.2808785},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/McGoughWBTRAGFM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TsaiYL15,
  author       = {Kun Lin Tsai and
                  Mengyuan Ye and
                  Fang{-}Yie Leu},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Secure Power Management Scheme for {WSN}},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {63--66},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808790},
  doi          = {10.1145/2808783.2808790},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TsaiYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YimCYMY15,
  author       = {Kangbin Yim and
                  Aniello Castiglione and
                  Jeong Hyun Yi and
                  Mauro Migliardi and
                  Ilsun You},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Cyber Threats to Industrial Control Systems},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {79--81},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808795},
  doi          = {10.1145/2808783.2808795},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YimCYMY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015mist,
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783},
  doi          = {10.1145/2808783},
  isbn         = {978-1-4503-3824-0},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2015mist.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics