Collaborating as Normal: Detecting Systemic Anomalies in Your Partner
暂无分享,去创建一个
[1] V. N. Venkatakrishnan,et al. Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[2] Véronique Cortier,et al. Measuring vote privacy, revisited , 2012, CCS.
[3] Peter Y. A. Ryan,et al. Mathematical Models of Computer Security , 2000, FOSAD.
[4] Simon N. Foley,et al. Discovering emergent norms in security logs , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[5] Isidro Ramos,et al. Advances in Database Technology — EDBT'98 , 1998, Lecture Notes in Computer Science.
[6] Steven M. Bellovin,et al. The Insider Attack Problem Nature and Scope , 2008, Insider Attack and Cyber Security.
[7] Roberto Gorrieri,et al. Foundations of Security Analysis and Design VII , 2014, Lecture Notes in Computer Science.
[8] Simon N. Foley,et al. A nonfunctional approach to system integrity , 2003, IEEE J. Sel. Areas Commun..
[9] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[10] Joachim M. Buhmann,et al. On the definition of role mining , 2010, SACMAT '10.
[11] Dick Hardt,et al. The OAuth 2.0 Authorization Framework , 2012, RFC.
[12] Salvatore J. Stolfo,et al. Insider Attack and Cyber Security - Beyond the Hacker , 2008, Advances in Information Security.
[13] Martin Kuhlmann,et al. Role mining - revealing business roles for security administration using data mining technology , 2003, SACMAT '03.
[14] Ravi S. Sandhu,et al. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management , 1997, DBSec.
[15] Dimitrios Gunopulos,et al. Mining Process Models from Workflow Logs , 1998, EDBT.
[16] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[17] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[18] Konstantin Beznosov,et al. The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems , 2012, CCS.
[19] Wil M. P. van der Aalst,et al. Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.
[20] Rafael Accorsi,et al. Automated Privacy Audits Based on Pruning of Log Data , 2008, 2008 12th Enterprise Distributed Object Computing Conference Workshops.