


default search action
8th MIST@CCS 2016: Vienna, Austria
- Ilsun You, Elisa Bertino:

Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4571-2
Session 1: Access Control & Application Security
- Wafa Ben Jaballah, Nizar Kheir:

A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications. 1-12 - Peter Mell, James M. Shook, Serban I. Gavrila:

Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems. 13-22 - Florian Kammueller, Manfred Kerber, Christian W. Probst:

Towards Formal Analysis of Insider Threats for Auctions. 23-34
Session 2: Best Paper Session
- Ryan V. Johnson, Jessie Lass, W. Michael Petullo:

Studying Naive Users and the Insider Threat with SimpleFlow. 35-46 - Tabish Rashid, Ioannis Agrafiotis, Jason R. C. Nurse:

A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models. 47-56
Session 3: Cyber Attacks & Network Security
- Stefan Achleitner, Thomas La Porta, Patrick D. McDaniel, Shridatt Sugrim, Srikanth V. Krishnamurthy, Ritu Chadha:

Cyber Deception: Virtual Networks to Defend Insider Reconnaissance. 57-68 - Simon Parkin, Andrew Fielder, Alex Ashby:

Pragmatic Security: Modelling IT Security Management Responsibilities for SME Archetypes. 69-80 - Fei Song, Wei Quan, Tianming Zhao, Hongke Zhang, Ziwei Hu, Ilsun You:

Ports Distribution Management for Privacy Protection inside Local Domain Name System. 81-87
Session 4: Short Papers Session
- Yvo Desmedt, Arash Shaghaghi:

Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor. 89-92 - Noam Shalev, Idit Keidar, Yosef Moatti, Yaron Weinsberg:

WatchIT: Who Watches Your IT Guy? 93-96 - Mohamed Yassine Naghmouchi, Nancy Perrot, Nizar Kheir, Ali Ridha Mahjoub, Jean-Philippe Wary:

A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems. 97-100 - Fulvio Valenza, Marco Vallini, Antonio Lioy:

Online and Offline Security Policy Assessment. 101-104 - Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese:

A Tripwire Grammar for Insider Threat Detection. 105-108 - Markus Wurzenberger, Florian Skopik, Roman Fiedler, Wolfgang Kastner:

Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools. 109-112 - Kyungroul Lee, Hyeungjun Yeuk, Kangbin Yim, Suhyun Kim:

Analysis on Manipulation of the MAC Address and Consequent Security Threats. 113-117

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














