Login / Signup
MIST@CCS
2015
2017
2015
2017
Keyphrases
Publications
2017
Hassan Takabi
,
Jafar Haadi Jafarian
Insider Threat Mitigation Using Moving Target Defense and Deception.
MIST@CCS
(2017)
Mookyu Park
,
Junwoo Seo
,
Kyoungmin Kim
,
Moosung Park
,
Kyungho Lee
Criminal Minds: Reasoning Prime Suspect in Russian Hacking Scandal by Perspective of Insiders.
MIST@CCS
(2017)
Vishal Sharma
,
Ilsun You
,
Gökhan Kul
Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain.
MIST@CCS
(2017)
Nir Drucker
,
Shay Gueron
Combining Homomorphic Encryption with Trusted Execution Environment: A Demonstration with Paillier Encryption and SGX.
MIST@CCS
(2017)
Gökhan Kul
,
Shambhu J. Upadhyaya
,
Andrew Hughes
Complexity of Insider Attacks to Databases.
MIST@CCS
(2017)
Matt Shockley
,
Chris Maixner
,
Ryan V. Johnson
,
Mitch DeRidder
,
W. Michael Petullo
Using VisorFlow to Control Information Flow without Modifying the Operating System Kernel or its Userspace.
MIST@CCS
(2017)
Alexander Hartl
,
Robert Annessi
,
Tanja Zseby
A Subliminal Channel in EdDSA: Information Leakage with High-Speed Signatures.
MIST@CCS
(2017)
Yassir Hashem
,
Hassan Takabi
,
Ram Dantu
,
Rodney D. Nielsen
A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats.
MIST@CCS
(2017)
Kim-Kwang Raymond Choo
Research Challenges and Opportunities in Big Forensic Data.
MIST@CCS
(2017)
Shih-Chieh Su
Behavior Prediction over Summarized Network Activities.
MIST@CCS
(2017)
Pablo Moriano
,
Jared Pendleton
,
Steven Rich
,
L. Jean Camp
Insider Threat Event Detection in User-System Interactions.
MIST@CCS
(2017)
Athul Harilal
,
Flavio Toffalini
,
John Henry Castellanos
,
Juan Guarnizo
,
Ivan Homoliak
,
Martín Ochoa
TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
MIST@CCS
(2017)
Antonis Michalas
,
Rohan Murray
MemTri: A Memory Forensics Triage Tool Using Bayesian Network and Volatility.
MIST@CCS
(2017)
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017
MIST@CCS
(2017)
2016
Tabish Rashid
,
Ioannis Agrafiotis
,
Jason R. C. Nurse
A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models.
MIST@CCS
(2016)
Fulvio Valenza
,
Marco Vallini
,
Antonio Lioy
Online and Offline Security Policy Assessment.
MIST@CCS
(2016)
Kyungroul Lee
,
Hyeungjun Yeuk
,
Kangbin Yim
,
Suhyun Kim
Analysis on Manipulation of the MAC Address and Consequent Security Threats.
MIST@CCS
(2016)
Noam Shalev
,
Idit Keidar
,
Yosef Moatti
,
Yaron Weinsberg
WatchIT: Who Watches Your IT Guy?
MIST@CCS
(2016)
Peter Mell
,
James M. Shook
,
Serban I. Gavrila
Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems.
MIST@CCS
(2016)
Simon Parkin
,
Andrew Fielder
,
Alex Ashby
Pragmatic Security: Modelling IT Security Management Responsibilities for SME Archetypes.
MIST@CCS
(2016)
Yvo Desmedt
,
Arash Shaghaghi
Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor.
MIST@CCS
(2016)
Fei Song
,
Wei Quan
,
Tianming Zhao
,
Hongke Zhang
,
Ziwei Hu
,
Ilsun You
Ports Distribution Management for Privacy Protection inside Local Domain Name System.
MIST@CCS
(2016)
Markus Wurzenberger
,
Florian Skopik
,
Roman Fiedler
,
Wolfgang Kastner
Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools.
MIST@CCS
(2016)
Ioannis Agrafiotis
,
Arnau Erola
,
Michael Goldsmith
,
Sadie Creese
A Tripwire Grammar for Insider Threat Detection.
MIST@CCS
(2016)
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016
MIST@CCS
(2016)
M. Yassine Naghmouchi
,
Nancy Perrot
,
Nizar Kheir
,
Ali Ridha Mahjoub
,
Jean-Philippe Wary
A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems.
MIST@CCS
(2016)
Florian Kammueller
,
Manfred Kerber
,
Christian W. Probst
Towards Formal Analysis of Insider Threats for Auctions.
MIST@CCS
(2016)
Stefan Achleitner
,
Thomas La Porta
,
Patrick D. McDaniel
,
Shridatt Sugrim
,
Srikanth V. Krishnamurthy
,
Ritu Chadha
Cyber Deception: Virtual Networks to Defend Insider Reconnaissance.
MIST@CCS
(2016)
Wafa Ben Jaballah
,
Nizar Kheir
A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications.
MIST@CCS
(2016)
Ryan V. Johnson
,
Jessie Lass
,
W. Michael Petullo
Studying Naive Users and the Insider Threat with SimpleFlow.
MIST@CCS
(2016)
2015
Aniello Castiglione
,
Arcangelo Castiglione
,
Alfredo De Santis
,
Barbara Masucci
,
Francesco Palmieri
,
Raffaele Pizzolante
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence.
MIST@CCS
(2015)
Sherenaz W. Al-Haj Baddar
,
Alessio Merlo
,
Mauro Migliardi
SKETURE: A Sketch-based Packet Analysis Tool.
MIST@CCS
(2015)
Yessir Hashem
,
Hassan Takabi
,
Mohammad GhasemiGol
,
Ram Dantu
Towards Insider Threat Detection Using Psychophysiological Signals.
MIST@CCS
(2015)
Alessandro Armando
,
Gianluca Bocci
,
Gabriele Costa
,
Rocco Mammoliti
,
Alessio Merlo
,
Silvio Ranise
,
Riccardo Traverso
,
Andrea Valenza
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module.
MIST@CCS
(2015)
Andrew Stephen McGough
,
David Wall
,
John Brennan
,
Georgios Theodoropoulos
,
Ed Ruck-Keene
,
Budi Arief
,
Carl Gamble
,
John S. Fitzgerald
,
Aad P. A. van Moorsel
,
Sujeewa Alwis
Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware).
MIST@CCS
(2015)
Kangbin Yim
,
Aniello Castiglione
,
Jeong Hyun Yi
,
Mauro Migliardi
,
Ilsun You
Cyber Threats to Industrial Control Systems.
MIST@CCS
(2015)
Kun Lin Tsai
,
Mengyuan Ye
,
Fang-Yie Leu
Secure Power Management Scheme for WSN.
MIST@CCS
(2015)
Gökhan Kul
,
Shambhu J. Upadhyaya
A Preliminary Cyber Ontology for Insider Threats in the Financial Sector.
MIST@CCS
(2015)
William Austin Casey
,
Quanyan Zhu
,
Jose Andre Morales
,
Bud Mishra
Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games.
MIST@CCS
(2015)
Gaurang Gavai
,
Kumar Sricharan
,
Dave Gunning
,
Rob Rolleston
,
John Hanley
,
Mudita Singhal
Detecting Insider Threat from Enterprise Social and Online Activity Data.
MIST@CCS
(2015)
Nicolas David
,
Alexandre David
,
René Rydhof Hansen
,
Kim Guldstrand Larsen
,
Axel Legay
,
Mads Chr. Olesen
,
Christian W. Probst
Modelling Social-Technical Attacks with Timed Automata.
MIST@CCS
(2015)
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015
MIST@CCS
(2015)
William R. Claycomb
Detecting Insider Threats: Who Is Winning the Game?
MIST@CCS
(2015)