Search dblp for Publications

export results for "toc:db/conf/sp/spw2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sp/AccorsiM13,
  author       = {Rafael Accorsi and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Preventive Inference Control in Data-centric Business Models},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {28--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.25},
  doi          = {10.1109/SPW.2013.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AccorsiM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AllodiSM13,
  author       = {Luca Allodi and
                  Woohyun Shim and
                  Fabio Massacci},
  title        = {Quantitative Assessment of Risk Reduction with Cybercrime Black Market
                  Monitoring},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {165--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.16},
  doi          = {10.1109/SPW.2013.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AllodiSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AxelradSBS13,
  author       = {Elise T. Axelrad and
                  Paul J. Sticha and
                  Oliver Brdiczka and
                  Jianqiang Shen},
  title        = {A Bayesian Network Model for Predicting Insider Threats},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {82--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.35},
  doi          = {10.1109/SPW.2013.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AxelradSBS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Bier13,
  author       = {Christoph Bier},
  title        = {How Usage Control and Provenance Tracking Get Together - {A} Data
                  Protection Perspective},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {13--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.24},
  doi          = {10.1109/SPW.2013.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Bier13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BonattiSFG13,
  author       = {Piero A. Bonatti and
                  Luigi Sauro and
                  Marco Faella and
                  Clemente Galdi},
  title        = {An Integrated Formal Approach to Usage Control},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {8--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.23},
  doi          = {10.1109/SPW.2013.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BonattiSFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ButinCM13,
  author       = {Denis Butin and
                  Marcos Chicote and
                  Daniel Le M{\'{e}}tayer},
  title        = {Log Design for Accountability},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.26},
  doi          = {10.1109/SPW.2013.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ButinCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChakravortyWR13,
  author       = {Antorweep Chakravorty and
                  Tomasz Wiktor Wlodarczyk and
                  Chunming Rong},
  title        = {Privacy Preserving Data Analytics for Smart Homes},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {23--27},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.22},
  doi          = {10.1109/SPW.2013.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChakravortyWR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CourtoisHHGG13,
  author       = {Nicolas T. Courtois and
                  Daniel Hulme and
                  Kumail Hussain and
                  Jerzy A. Gawinecki and
                  Marek Grajek},
  title        = {On Bad Randomness and Cloning of Contactless Payment and Building
                  Smart Cards},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {105--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.29},
  doi          = {10.1109/SPW.2013.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/CourtoisHHGG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/EldardiryBLHPB13,
  author       = {Hoda Eldardiry and
                  Evgeniy Bart and
                  Juan Liu and
                  John Hanley and
                  Bob Price and
                  Oliver Brdiczka},
  title        = {Multi-Domain Information Fusion for Insider Threat Detection},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {45--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.14},
  doi          = {10.1109/SPW.2013.14},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/EldardiryBLHPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ForoushaniZ13,
  author       = {Vahid Aghaei Foroushani and
                  Nur Zincir{-}Heywood},
  title        = {On Evaluating {IP} Traceback Schemes: {A} Practical Perspective},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {127--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.13},
  doi          = {10.1109/SPW.2013.13},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ForoushaniZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GargN13,
  author       = {Vaibhav Garg and
                  Shirin Nilizadeh},
  title        = {Craigslist Scams and Community Composition: Investigating Online Fraud
                  Victimization},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {123--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.21},
  doi          = {10.1109/SPW.2013.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GargN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GlasserL13,
  author       = {Joshua Glasser and
                  Brian Lindauer},
  title        = {Bridging the Gap: {A} Pragmatic Approach to Generating Insider Threat
                  Data},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {98--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.37},
  doi          = {10.1109/SPW.2013.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GlasserL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GrabskiS13,
  author       = {Szymon Grabski and
                  Krzysztof Szczypiorski},
  title        = {Steganography in {OFDM} Symbols of Fast {IEEE} 802.11n Networks},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {158--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.20},
  doi          = {10.1109/SPW.2013.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GrabskiS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GreitzerF13,
  author       = {Frank L. Greitzer and
                  Thomas A. Ferryman},
  title        = {Methods and Metrics for Evaluating Analytic Insider Threat Tools},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {90--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.34},
  doi          = {10.1109/SPW.2013.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GreitzerF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HenzeHW13,
  author       = {Martin Henze and
                  Ren{\'{e}} Hummen and
                  Klaus Wehrle},
  title        = {The Cloud Needs Cross-Layer Data Handling Annotations},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {18--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.31},
  doi          = {10.1109/SPW.2013.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HenzeHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/IdikaVP13,
  author       = {Nwokedi C. Idika and
                  Mayank Varia and
                  Harry Phan},
  title        = {The Probabilistic Provenance Graph},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {34--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.27},
  doi          = {10.1109/SPW.2013.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/IdikaVP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/IsacenkovaTCBF13,
  author       = {Jelena Isacenkova and
                  Olivier Thonnard and
                  Andrei Costin and
                  Davide Balzarotti and
                  Aur{\'{e}}lien Francillon},
  title        = {Inside the {SCAM} Jungle: {A} Closer Look at 419 Scam Email Operations},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {143--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.15},
  doi          = {10.1109/SPW.2013.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/IsacenkovaTCBF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KammullerP13,
  author       = {Florian Kamm{\"{u}}ller and
                  Christian W. Probst},
  title        = {Invalidating Policies using Structural Information},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {76--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.36},
  doi          = {10.1109/SPW.2013.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KammullerP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KentL13,
  author       = {Alexander D. Kent and
                  Lorie M. Liebrock},
  title        = {Differentiating User Authentication Graphs},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {72--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.38},
  doi          = {10.1109/SPW.2013.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KentL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KopiczkoMS13,
  author       = {Pawel Kopiczko and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {StegTorrent: {A} Steganographic Method for the {P2P} File Sharing
                  Service},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {151--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.11},
  doi          = {10.1109/SPW.2013.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KopiczkoMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MicklitzOS13,
  author       = {Stephan Micklitz and
                  Martin Ortlieb and
                  Jessica Staddon},
  title        = {"I hereby leave my email to...": Data Usage Control and the Digital
                  Estate},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {42--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.28},
  doi          = {10.1109/SPW.2013.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MicklitzOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MucheneLS13,
  author       = {David N. Muchene and
                  Klevis Luli and
                  Craig A. Shue},
  title        = {Reporting Insider Threats via Covert Channels},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {68--71},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.30},
  doi          = {10.1109/SPW.2013.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MucheneLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/OhanaPC13,
  author       = {Donny Jacob Ohana and
                  Liza Phillips and
                  Lei Chen},
  title        = {Preventing Cell Phone Intrusion and Theft using Biometrics},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {173--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.19},
  doi          = {10.1109/SPW.2013.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/OhanaPC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/OhanaS13,
  author       = {Donny Jacob Ohana and
                  Narasimha K. Shashidhar},
  title        = {Do Private and Portable Web Browsers Leave Incriminating Evidence?
                  {A} Forensic Analysis of Residual Artifacts from Private and Portable
                  Web Browsing Sessions},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {135--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.18},
  doi          = {10.1109/SPW.2013.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/OhanaS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RaftopoulosD13,
  author       = {Elias Raftopoulos and
                  Xenofontas A. Dimitropoulos},
  title        = {Understanding Network Forensics Analysis in an Operational Environment},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {111--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.12},
  doi          = {10.1109/SPW.2013.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/RaftopoulosD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ShoshaTG13,
  author       = {Ahmed F. Shosha and
                  Lee Tobin and
                  Pavel Gladyshev},
  title        = {Digital Forensic Reconstruction of a Program Action},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {119--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.17},
  doi          = {10.1109/SPW.2013.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ShoshaTG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SongSHS13,
  author       = {Yingbo Song and
                  Malek Ben Salem and
                  Shlomo Hershkop and
                  Salvatore J. Stolfo},
  title        = {System Level User Behavior Biometrics using Fisher Features and Gaussian
                  Mixture Models},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {52--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.33},
  doi          = {10.1109/SPW.2013.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SongSHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YoungGMSS13,
  author       = {William T. Young and
                  Henry G. Goldberg and
                  Alex Memory and
                  James F. Sartain and
                  Ted E. Senator},
  title        = {Use of Domain Knowledge to Detect Insider Threats in Computer Activities},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {60--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.32},
  doi          = {10.1109/SPW.2013.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/YoungGMSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2013w,
  title        = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6564486/proceeding},
  isbn         = {978-1-4799-0458-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/2013w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics