


default search action
7th MIST@CCS 2015: Denver, Colorado, USA
- Elisa Bertino, Ilsun You:

Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3824-0
Session 1: Regular Paper Session
- Andrew Stephen McGough

, David Wall, John Brennan
, Georgios Theodoropoulos
, Ed Ruck-Keene, Budi Arief
, Carl Gamble, John S. Fitzgerald
, Aad P. A. van Moorsel, Sujeewa Alwis:
Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). 1-12 - Gaurang Gavai, Kumar Sricharan, Dave Gunning, Rob Rolleston, John Hanley, Mudita Singhal:

Detecting Insider Threat from Enterprise Social and Online Activity Data. 13-20 - Nicolas David, Alexandre David, René Rydhof Hansen

, Kim Guldstrand Larsen
, Axel Legay, Mads Chr. Olesen, Christian W. Probst
:
Modelling Social-Technical Attacks with Timed Automata. 21-28 - Aniello Castiglione

, Arcangelo Castiglione
, Alfredo De Santis
, Barbara Masucci, Francesco Palmieri
, Raffaele Pizzolante:
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence. 29-39 - Alessandro Armando

, Gianluca Bocci, Gabriele Costa
, Rocco Mammoliti, Alessio Merlo, Silvio Ranise
, Riccardo Traverso, Andrea Valenza
:
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module. 41-49
Session 2: Keynote Address
- William R. Claycomb:

Detecting Insider Threats: Who Is Winning the Game? 51
Session 3: Best Paper & Poster Session
- William Austin Casey, Quanyan Zhu, Jose Andre Morales, Bud Mishra:

Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games. 53-62 - Kun Lin Tsai

, Mengyuan Ye, Fang-Yie Leu:
Secure Power Management Scheme for WSN. 63-66 - Sherenaz W. Al-Haj Baddar, Alessio Merlo, Mauro Migliardi

:
SKETURE: A Sketch-based Packet Analysis Tool. 67-70 - Yessir Hashem, Hassan Takabi, Mohammad GhasemiGol

, Ram Dantu:
Towards Insider Threat Detection Using Psychophysiological Signals. 71-74 - Gökhan Kul

, Shambhu J. Upadhyaya:
A Preliminary Cyber Ontology for Insider Threats in the Financial Sector. 75-78
Session 4: Panel Discussion
- Kangbin Yim, Aniello Castiglione

, Jeong Hyun Yi
, Mauro Migliardi
, Ilsun You:
Cyber Threats to Industrial Control Systems. 79-81

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














