Search dblp for Publications

export results for "toc:db/conf/ccs/insider-threats2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/AkavipatDK010,
  author       = {Ruj Akavipat and
                  Apurv Dhadphale and
                  Apu Kapadia and
                  Matthew Wright},
  editor       = {Ehab Al{-}Shaer and
                  Brent Lagesse and
                  Craig A. Shue},
  title        = {ReDS: reputation for directory services in {P2P} systems},
  booktitle    = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider
                  Threats '10, Chicago, Illinois, USA, October 8, 2010},
  pages        = {47--54},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866886.1866896},
  doi          = {10.1145/1866886.1866896},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AkavipatDK010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Cappelli10,
  author       = {Dawn M. Cappelli},
  editor       = {Ehab Al{-}Shaer and
                  Brent Lagesse and
                  Craig A. Shue},
  title        = {Using empirical insider threat case data to design a mitigation strategy},
  booktitle    = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider
                  Threats '10, Chicago, Illinois, USA, October 8, 2010},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866886.1866888},
  doi          = {10.1145/1866886.1866888},
  timestamp    = {Thu, 17 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Cappelli10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ClaycombS10,
  author       = {William R. Claycomb and
                  Dongwan Shin},
  editor       = {Ehab Al{-}Shaer and
                  Brent Lagesse and
                  Craig A. Shue},
  title        = {Detecting insider activity using enhanced directory virtualization},
  booktitle    = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider
                  Threats '10, Chicago, Illinois, USA, October 8, 2010},
  pages        = {29--36},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866886.1866894},
  doi          = {10.1145/1866886.1866894},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ClaycombS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GafnySRE10,
  author       = {Ma'ayan Gafny and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  editor       = {Ehab Al{-}Shaer and
                  Brent Lagesse and
                  Craig A. Shue},
  title        = {Detecting data misuse by applying context-based data linkage},
  booktitle    = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider
                  Threats '10, Chicago, Illinois, USA, October 8, 2010},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866886.1866890},
  doi          = {10.1145/1866886.1866890},
  timestamp    = {Thu, 17 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GafnySRE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HarelSRE10,
  author       = {Amir Harel and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  editor       = {Ehab Al{-}Shaer and
                  Brent Lagesse and
                  Craig A. Shue},
  title        = {M-score: estimating the potential damage of data leakage incident
                  by assigning misuseability weight},
  booktitle    = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider
                  Threats '10, Chicago, Illinois, USA, October 8, 2010},
  pages        = {13--20},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866886.1866891},
  doi          = {10.1145/1866886.1866891},
  timestamp    = {Thu, 17 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HarelSRE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NellikarNC10,
  author       = {Suraj Nellikar and
                  David M. Nicol and
                  Jai J. Choi},
  editor       = {Ehab Al{-}Shaer and
                  Brent Lagesse and
                  Craig A. Shue},
  title        = {Role-based differentiation for insider detection algorithms},
  booktitle    = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider
                  Threats '10, Chicago, Illinois, USA, October 8, 2010},
  pages        = {55--62},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866886.1866897},
  doi          = {10.1145/1866886.1866897},
  timestamp    = {Thu, 17 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NellikarNC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StefanovA10,
  author       = {Emil Stefanov and
                  Mikhail Atallah},
  editor       = {Ehab Al{-}Shaer and
                  Brent Lagesse and
                  Craig A. Shue},
  title        = {Duress detection for authentication attacks against multiple administrators},
  booktitle    = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider
                  Threats '10, Chicago, Illinois, USA, October 8, 2010},
  pages        = {37--46},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866886.1866895},
  doi          = {10.1145/1866886.1866895},
  timestamp    = {Thu, 17 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/StefanovA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TuttleWLL10,
  author       = {John Tuttle and
                  Robert J. Walls and
                  Erik G. Learned{-}Miller and
                  Brian Neil Levine},
  editor       = {Ehab Al{-}Shaer and
                  Brent Lagesse and
                  Craig A. Shue},
  title        = {Reverse engineering for mobile systems forensics with Ares},
  booktitle    = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider
                  Threats '10, Chicago, Illinois, USA, October 8, 2010},
  pages        = {21--28},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866886.1866892},
  doi          = {10.1145/1866886.1866892},
  timestamp    = {Thu, 17 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TuttleWLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010insider-threats,
  editor       = {Ehab Al{-}Shaer and
                  Brent Lagesse and
                  Craig A. Shue},
  title        = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider
                  Threats '10, Chicago, Illinois, USA, October 8, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866886},
  doi          = {10.1145/1866886},
  isbn         = {978-1-4503-0092-6},
  timestamp    = {Thu, 17 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2010insider-threats.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics