default search action
Search dblp for Publications
export results for "toc:db/conf/sp/spw2013.bht:"
@inproceedings{DBLP:conf/sp/AccorsiM13, author = {Rafael Accorsi and G{\"{u}}nter M{\"{u}}ller}, title = {Preventive Inference Control in Data-centric Business Models}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {28--33}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.25}, doi = {10.1109/SPW.2013.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/AccorsiM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AllodiSM13, author = {Luca Allodi and Woohyun Shim and Fabio Massacci}, title = {Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {165--172}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.16}, doi = {10.1109/SPW.2013.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/AllodiSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AxelradSBS13, author = {Elise T. Axelrad and Paul J. Sticha and Oliver Brdiczka and Jianqiang Shen}, title = {A Bayesian Network Model for Predicting Insider Threats}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {82--89}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.35}, doi = {10.1109/SPW.2013.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/AxelradSBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Bier13, author = {Christoph Bier}, title = {How Usage Control and Provenance Tracking Get Together - {A} Data Protection Perspective}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {13--17}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.24}, doi = {10.1109/SPW.2013.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Bier13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BonattiSFG13, author = {Piero A. Bonatti and Luigi Sauro and Marco Faella and Clemente Galdi}, title = {An Integrated Formal Approach to Usage Control}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {8--12}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.23}, doi = {10.1109/SPW.2013.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BonattiSFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ButinCM13, author = {Denis Butin and Marcos Chicote and Daniel Le M{\'{e}}tayer}, title = {Log Design for Accountability}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.26}, doi = {10.1109/SPW.2013.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ButinCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChakravortyWR13, author = {Antorweep Chakravorty and Tomasz Wiktor Wlodarczyk and Chunming Rong}, title = {Privacy Preserving Data Analytics for Smart Homes}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {23--27}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.22}, doi = {10.1109/SPW.2013.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChakravortyWR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CourtoisHHGG13, author = {Nicolas T. Courtois and Daniel Hulme and Kumail Hussain and Jerzy A. Gawinecki and Marek Grajek}, title = {On Bad Randomness and Cloning of Contactless Payment and Building Smart Cards}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {105--110}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.29}, doi = {10.1109/SPW.2013.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/CourtoisHHGG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/EldardiryBLHPB13, author = {Hoda Eldardiry and Evgeniy Bart and Juan Liu and John Hanley and Bob Price and Oliver Brdiczka}, title = {Multi-Domain Information Fusion for Insider Threat Detection}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {45--51}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.14}, doi = {10.1109/SPW.2013.14}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/EldardiryBLHPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ForoushaniZ13, author = {Vahid Aghaei Foroushani and Nur Zincir{-}Heywood}, title = {On Evaluating {IP} Traceback Schemes: {A} Practical Perspective}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {127--134}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.13}, doi = {10.1109/SPW.2013.13}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ForoushaniZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GargN13, author = {Vaibhav Garg and Shirin Nilizadeh}, title = {Craigslist Scams and Community Composition: Investigating Online Fraud Victimization}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {123--126}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.21}, doi = {10.1109/SPW.2013.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/GargN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GlasserL13, author = {Joshua Glasser and Brian Lindauer}, title = {Bridging the Gap: {A} Pragmatic Approach to Generating Insider Threat Data}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {98--104}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.37}, doi = {10.1109/SPW.2013.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/GlasserL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GrabskiS13, author = {Szymon Grabski and Krzysztof Szczypiorski}, title = {Steganography in {OFDM} Symbols of Fast {IEEE} 802.11n Networks}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {158--164}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.20}, doi = {10.1109/SPW.2013.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/GrabskiS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GreitzerF13, author = {Frank L. Greitzer and Thomas A. Ferryman}, title = {Methods and Metrics for Evaluating Analytic Insider Threat Tools}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {90--97}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.34}, doi = {10.1109/SPW.2013.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/GreitzerF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HenzeHW13, author = {Martin Henze and Ren{\'{e}} Hummen and Klaus Wehrle}, title = {The Cloud Needs Cross-Layer Data Handling Annotations}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {18--22}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.31}, doi = {10.1109/SPW.2013.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/HenzeHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/IdikaVP13, author = {Nwokedi C. Idika and Mayank Varia and Harry Phan}, title = {The Probabilistic Provenance Graph}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {34--41}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.27}, doi = {10.1109/SPW.2013.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/IdikaVP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/IsacenkovaTCBF13, author = {Jelena Isacenkova and Olivier Thonnard and Andrei Costin and Davide Balzarotti and Aur{\'{e}}lien Francillon}, title = {Inside the {SCAM} Jungle: {A} Closer Look at 419 Scam Email Operations}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {143--150}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.15}, doi = {10.1109/SPW.2013.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/IsacenkovaTCBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KammullerP13, author = {Florian Kamm{\"{u}}ller and Christian W. Probst}, title = {Invalidating Policies using Structural Information}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {76--81}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.36}, doi = {10.1109/SPW.2013.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KammullerP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KentL13, author = {Alexander D. Kent and Lorie M. Liebrock}, title = {Differentiating User Authentication Graphs}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {72--75}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.38}, doi = {10.1109/SPW.2013.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KentL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KopiczkoMS13, author = {Pawel Kopiczko and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {StegTorrent: {A} Steganographic Method for the {P2P} File Sharing Service}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {151--157}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.11}, doi = {10.1109/SPW.2013.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KopiczkoMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MicklitzOS13, author = {Stephan Micklitz and Martin Ortlieb and Jessica Staddon}, title = {"I hereby leave my email to...": Data Usage Control and the Digital Estate}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {42--44}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.28}, doi = {10.1109/SPW.2013.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MicklitzOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MucheneLS13, author = {David N. Muchene and Klevis Luli and Craig A. Shue}, title = {Reporting Insider Threats via Covert Channels}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {68--71}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.30}, doi = {10.1109/SPW.2013.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MucheneLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/OhanaPC13, author = {Donny Jacob Ohana and Liza Phillips and Lei Chen}, title = {Preventing Cell Phone Intrusion and Theft using Biometrics}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {173--180}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.19}, doi = {10.1109/SPW.2013.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/OhanaPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/OhanaS13, author = {Donny Jacob Ohana and Narasimha K. Shashidhar}, title = {Do Private and Portable Web Browsers Leave Incriminating Evidence? {A} Forensic Analysis of Residual Artifacts from Private and Portable Web Browsing Sessions}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {135--142}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.18}, doi = {10.1109/SPW.2013.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/OhanaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RaftopoulosD13, author = {Elias Raftopoulos and Xenofontas A. Dimitropoulos}, title = {Understanding Network Forensics Analysis in an Operational Environment}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {111--118}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.12}, doi = {10.1109/SPW.2013.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/RaftopoulosD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ShoshaTG13, author = {Ahmed F. Shosha and Lee Tobin and Pavel Gladyshev}, title = {Digital Forensic Reconstruction of a Program Action}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {119--122}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.17}, doi = {10.1109/SPW.2013.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ShoshaTG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SongSHS13, author = {Yingbo Song and Malek Ben Salem and Shlomo Hershkop and Salvatore J. Stolfo}, title = {System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {52--59}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.33}, doi = {10.1109/SPW.2013.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SongSHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/YoungGMSS13, author = {William T. Young and Henry G. Goldberg and Alex Memory and James F. Sartain and Ted E. Senator}, title = {Use of Domain Knowledge to Detect Insider Threats in Computer Activities}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {60--67}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.32}, doi = {10.1109/SPW.2013.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/YoungGMSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/2013w, title = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6564486/proceeding}, isbn = {978-1-4799-0458-7}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/2013w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.