Login / Signup
Insider Threats@CCS
2010
2010
2010
Keyphrases
Publications
2010
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010
Insider Threats@CCS
(2010)
William R. Claycomb
,
Dongwan Shin
Detecting insider activity using enhanced directory virtualization.
Insider Threats@CCS
(2010)
John Tuttle
,
Robert J. Walls
,
Erik G. Learned-Miller
,
Brian Neil Levine
Reverse engineering for mobile systems forensics with Ares.
Insider Threats@CCS
(2010)
Amir Harel
,
Asaf Shabtai
,
Lior Rokach
,
Yuval Elovici
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight.
Insider Threats@CCS
(2010)
Dawn M. Cappelli
Using empirical insider threat case data to design a mitigation strategy.
Insider Threats@CCS
(2010)
Emil Stefanov
,
Mikhail Atallah
Duress detection for authentication attacks against multiple administrators.
Insider Threats@CCS
(2010)
Ruj Akavipat
,
Apurv Dhadphale
,
Apu Kapadia
,
Matthew Wright
ReDS: reputation for directory services in P2P systems.
Insider Threats@CCS
(2010)
Suraj Nellikar
,
David M. Nicol
,
Jai J. Choi
Role-based differentiation for insider detection algorithms.
Insider Threats@CCS
(2010)
Ma'ayan Gafny
,
Asaf Shabtai
,
Lior Rokach
,
Yuval Elovici
Detecting data misuse by applying context-based data linkage.
Insider Threats@CCS
(2010)