Search Results
2. Simulated User Bots: Real Time Testing of Insider Threat Detection Systems
3. Active authentication using file system decoys and user behavior modeling: results of a large scale study: Data
4. Anti-Virus in Silicon
5. Fox in the Trap: Thwarting Masqueraders via Automated Decoy Document Deployment
6. Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads
7. Measuring Drive-by Download Defense in Depth
8. Model Aggregation for Distributed Content Anomaly Detection
9. Model Aggregation for Distributed Content Anomaly Detection
10. Synthetic Data Generation and Defense in Depth Measurement of Web Applications
11. Unsupervised Anomaly-based Malware Detection using Hardware Features
12. Unsupervised Anomaly-based Malware Detection using Hardware Features
13. Bait and Snitch: Defending Computer Systems with Decoys
14. When Firmware Modifications Attack: A Case Study of Embedded Exploitation
15. Concurrency Attacks
16. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
17. Lost in Translation: Improving Decoy Documents via Automated Translation
18. Software-based Decoy System for Insider Threats
19. Usable Secure Private Search
20. ALDR: A New Metric for Measuring Effective Layering of Defenses
21. Behavior-Based Network Traffic Synthesis
22. Combining a Baiting and a User Search Profiling Techniques for Masquerade Detection
23. Concurrency Attacks
24. Cross-domain Collaborative Anomaly Detection: So Far Yet So Close
25. Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned
26. Decoy Document Deployment for Effective Masquerade Attack Detection
27. Defending Embedded Systems with Software Symbiotes
28. From Prey to Hunter: Transforming Legacy Embedded Devices into Exploitation Sensor Grids
29. Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design
30. Markov Models for Network-Behavior Modeling and Anonymization
31. Measuring the Human Factor of Cyber Security
32. Modeling User Search Behavior for Masquerade Detection
33. On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned
34. Print Me If You Dare: Firmware Modification Attacks and the Rise of Printer Malware
35. Reflections on the Engineering and Operation of a Large-Scale Embedded Device Vulnerability Scanner
36. Symbiotes and defensive Mutualism: Moving Target Defense
37. The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security
38. The SPARCHS Project: Hardware Support for Software Security
39. A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan
40. Automating the Injection of Believable Decoys to Detect Snooping
41. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
42. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
43. Ethics in Security Vulnerability Research
44. Modeling User Search Behavior for Masquerade Detection
45. Modeling User Search-Behavior for Masquerade Detection
46. Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating
47. Addressing the Insider Threat
48. A Network Access Control Mechanism Based on Behavior Profiles
49. Baiting Inside Attackers Using Decoy Documents
50. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
- « Previous
- Next »
- 1
- 2
- 3
- 4