


default search action
34th SP 2013: San Francisco, California, USA - Workshops
- 2013 IEEE Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013. IEEE Computer Society 2013, ISBN 978-1-4799-0458-7

DUMA 2013 Research Paper Presentations
- Denis Butin

, Marcos Chicote, Daniel Le Métayer:
Log Design for Accountability. 1-7 - Piero A. Bonatti

, Luigi Sauro, Marco Faella, Clemente Galdi
:
An Integrated Formal Approach to Usage Control. 8-12 - Christoph Bier:

How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective. 13-17
DUMA 2013 Position Paper Presentations
- Martin Henze

, René Hummen, Klaus Wehrle
:
The Cloud Needs Cross-Layer Data Handling Annotations. 18-22 - Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong

:
Privacy Preserving Data Analytics for Smart Homes. 23-27 - Rafael Accorsi, Günter Müller:

Preventive Inference Control in Data-centric Business Models. 28-33 - Nwokedi C. Idika, Mayank Varia, Harry Phan:

The Probabilistic Provenance Graph. 34-41
DUMA 2013 Position Paper
- Stephan Micklitz, Martin Ortlieb, Jessica Staddon:

"I hereby leave my email to...": Data Usage Control and the Digital Estate. 42-44
WRIT 2013: Workshop on Research for Insider Threat
- Hoda Eldardiry

, Evgeniy Bart, Juan Liu, John Hanley, Bob Price, Oliver Brdiczka:
Multi-Domain Information Fusion for Insider Threat Detection. 45-51 - Yingbo Song, Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo:

System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models. 52-59 - William T. Young, Henry G. Goldberg, Alex Memory, James F. Sartain, Ted E. Senator:

Use of Domain Knowledge to Detect Insider Threats in Computer Activities. 60-67 - David N. Muchene, Klevis Luli, Craig A. Shue:

Reporting Insider Threats via Covert Channels. 68-71 - Alexander D. Kent, Lorie M. Liebrock:

Differentiating User Authentication Graphs. 72-75 - Florian Kammüller, Christian W. Probst

:
Invalidating Policies using Structural Information. 76-81 - Elise T. Axelrad, Paul J. Sticha, Oliver Brdiczka, Jianqiang Shen:

A Bayesian Network Model for Predicting Insider Threats. 82-89 - Frank L. Greitzer, Thomas A. Ferryman:

Methods and Metrics for Evaluating Analytic Insider Threat Tools. 90-97 - Joshua Glasser, Brian Lindauer:

Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data. 98-104
IWCC 2013 Invited Paper
- Nicolas T. Courtois, Daniel Hulme, Kumail Hussain, Jerzy A. Gawinecki, Marek Grajek:

On Bad Randomness and Cloning of Contactless Payment and Building Smart Cards. 105-110
IWCC 2013 Session I - Digital Forensics
- Elias Raftopoulos, Xenofontas A. Dimitropoulos:

Understanding Network Forensics Analysis in an Operational Environment. 111-118 - Ahmed F. Shosha, Lee Tobin, Pavel Gladyshev

:
Digital Forensic Reconstruction of a Program Action. 119-122 - Vaibhav Garg, Shirin Nilizadeh:

Craigslist Scams and Community Composition: Investigating Online Fraud Victimization. 123-126 - Vahid Aghaei Foroushani, Nur Zincir-Heywood

:
On Evaluating IP Traceback Schemes: A Practical Perspective. 127-134
IWCC 2013 Session II - Cyber Crimes Techniques
- Donny Jacob Ohana, Narasimha K. Shashidhar:

Do Private and Portable Web Browsers Leave Incriminating Evidence? A Forensic Analysis of Residual Artifacts from Private and Portable Web Browsing Sessions. 135-142 - Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Davide Balzarotti, Aurélien Francillon

:
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations. 143-150 - Pawel Kopiczko, Wojciech Mazurczyk

, Krzysztof Szczypiorski
:
StegTorrent: A Steganographic Method for the P2P File Sharing Service. 151-157 - Szymon Grabski, Krzysztof Szczypiorski

:
Steganography in OFDM Symbols of Fast IEEE 802.11n Networks. 158-164
IWCC 2013 Session III - Cyber Crimes Prevention & Monitoring
- Luca Allodi

, Woohyun Shim, Fabio Massacci
:
Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring. 165-172 - Donny Jacob Ohana, Liza Phillips, Lei Chen:

Preventing Cell Phone Intrusion and Theft using Biometrics. 173-180

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














