default search action
34th SP 2013: San Francisco, California, USA - Workshops
- 2013 IEEE Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013. IEEE Computer Society 2013, ISBN 978-1-4799-0458-7
DUMA 2013 Research Paper Presentations
- Denis Butin, Marcos Chicote, Daniel Le Métayer:
Log Design for Accountability. 1-7 - Piero A. Bonatti, Luigi Sauro, Marco Faella, Clemente Galdi:
An Integrated Formal Approach to Usage Control. 8-12 - Christoph Bier:
How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective. 13-17
DUMA 2013 Position Paper Presentations
- Martin Henze, René Hummen, Klaus Wehrle:
The Cloud Needs Cross-Layer Data Handling Annotations. 18-22 - Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong:
Privacy Preserving Data Analytics for Smart Homes. 23-27 - Rafael Accorsi, Günter Müller:
Preventive Inference Control in Data-centric Business Models. 28-33 - Nwokedi C. Idika, Mayank Varia, Harry Phan:
The Probabilistic Provenance Graph. 34-41
DUMA 2013 Position Paper
- Stephan Micklitz, Martin Ortlieb, Jessica Staddon:
"I hereby leave my email to...": Data Usage Control and the Digital Estate. 42-44
WRIT 2013: Workshop on Research for Insider Threat
- Hoda Eldardiry, Evgeniy Bart, Juan Liu, John Hanley, Bob Price, Oliver Brdiczka:
Multi-Domain Information Fusion for Insider Threat Detection. 45-51 - Yingbo Song, Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo:
System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models. 52-59 - William T. Young, Henry G. Goldberg, Alex Memory, James F. Sartain, Ted E. Senator:
Use of Domain Knowledge to Detect Insider Threats in Computer Activities. 60-67 - David N. Muchene, Klevis Luli, Craig A. Shue:
Reporting Insider Threats via Covert Channels. 68-71 - Alexander D. Kent, Lorie M. Liebrock:
Differentiating User Authentication Graphs. 72-75 - Florian Kammüller, Christian W. Probst:
Invalidating Policies using Structural Information. 76-81 - Elise T. Axelrad, Paul J. Sticha, Oliver Brdiczka, Jianqiang Shen:
A Bayesian Network Model for Predicting Insider Threats. 82-89 - Frank L. Greitzer, Thomas A. Ferryman:
Methods and Metrics for Evaluating Analytic Insider Threat Tools. 90-97 - Joshua Glasser, Brian Lindauer:
Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data. 98-104
IWCC 2013 Invited Paper
- Nicolas T. Courtois, Daniel Hulme, Kumail Hussain, Jerzy A. Gawinecki, Marek Grajek:
On Bad Randomness and Cloning of Contactless Payment and Building Smart Cards. 105-110
IWCC 2013 Session I - Digital Forensics
- Elias Raftopoulos, Xenofontas A. Dimitropoulos:
Understanding Network Forensics Analysis in an Operational Environment. 111-118 - Ahmed F. Shosha, Lee Tobin, Pavel Gladyshev:
Digital Forensic Reconstruction of a Program Action. 119-122 - Vaibhav Garg, Shirin Nilizadeh:
Craigslist Scams and Community Composition: Investigating Online Fraud Victimization. 123-126 - Vahid Aghaei Foroushani, Nur Zincir-Heywood:
On Evaluating IP Traceback Schemes: A Practical Perspective. 127-134
IWCC 2013 Session II - Cyber Crimes Techniques
- Donny Jacob Ohana, Narasimha K. Shashidhar:
Do Private and Portable Web Browsers Leave Incriminating Evidence? A Forensic Analysis of Residual Artifacts from Private and Portable Web Browsing Sessions. 135-142 - Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Davide Balzarotti, Aurélien Francillon:
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations. 143-150 - Pawel Kopiczko, Wojciech Mazurczyk, Krzysztof Szczypiorski:
StegTorrent: A Steganographic Method for the P2P File Sharing Service. 151-157 - Szymon Grabski, Krzysztof Szczypiorski:
Steganography in OFDM Symbols of Fast IEEE 802.11n Networks. 158-164
IWCC 2013 Session III - Cyber Crimes Prevention & Monitoring
- Luca Allodi, Woohyun Shim, Fabio Massacci:
Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring. 165-172 - Donny Jacob Ohana, Liza Phillips, Lei Chen:
Preventing Cell Phone Intrusion and Theft using Biometrics. 173-180
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.