:facetid:toc:\"db/conf/ccs/mist2016.bht\"OK:facetid:toc:db/conf/ccs/mist2016.bhtStefan AchleitnerThomas La PortaPatrick D. McDanielShridatt SugrimSrikanth V. KrishnamurthyRitu ChadhaCyber Deception: Virtual Networks to Defend Insider Reconnaissance.MIST@CCS57-682016Conference and Workshop Papersclosedconf/ccs/AchleitnerPMSKC16http://dl.acm.org/citation.cfm?id=2995962https://dblp.org/rec/conf/ccs/AchleitnerPMSKC16URL#3216510Ioannis AgrafiotisArnau ErolaMichael GoldsmithSadie CreeseA Tripwire Grammar for Insider Threat Detection.MIST@CCS105-1082016Conference and Workshop Papersclosedconf/ccs/AgrafiotisEGC16http://dl.acm.org/citation.cfm?id=2995971https://dblp.org/rec/conf/ccs/AgrafiotisEGC16URL#3216513Yvo DesmedtArash ShaghaghiFunction-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor.MIST@CCS89-922016Conference and Workshop Papersclosedconf/ccs/DesmedtS16http://dl.acm.org/citation.cfm?id=2995974https://dblp.org/rec/conf/ccs/DesmedtS16URL#3216601Wafa Ben JaballahNizar KheirA Grey-Box Approach for Detecting Malicious User Interactions in Web Applications.MIST@CCS1-122016Conference and Workshop Papersclosedconf/ccs/JaballahK16http://dl.acm.org/citation.cfm?id=2995966https://dblp.org/rec/conf/ccs/JaballahK16URL#3216678Ryan V. JohnsonJessie LassW. Michael PetulloStudying Naive Users and the Insider Threat with SimpleFlow.MIST@CCS35-462016Conference and Workshop Papersclosedconf/ccs/JohnsonLP16http://dl.acm.org/citation.cfm?id=2995960https://dblp.org/rec/conf/ccs/JohnsonLP16URL#3216689Florian KammuellerManfred KerberChristian W. ProbstTowards Formal Analysis of Insider Threats for Auctions.MIST@CCS23-342016Conference and Workshop Papersclosedconf/ccs/KammuellerKP16http://dl.acm.org/citation.cfm?id=2995963https://dblp.org/rec/conf/ccs/KammuellerKP16URL#3216693Kyungroul LeeHyeungjun YeukKangbin YimSuhyun KimAnalysis on Manipulation of the MAC Address and Consequent Security Threats.MIST@CCS113-1172016Conference and Workshop Papersclosedconf/ccs/LeeYYK16http://dl.acm.org/citation.cfm?id=2995975https://dblp.org/rec/conf/ccs/LeeYYK16URL#3216726Peter MellJames M. ShookSerban I. GavrilaRestricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems.MIST@CCS13-222016Conference and Workshop Papersclosedconf/ccs/MellSG16http://dl.acm.org/citation.cfm?id=2995961https://dblp.org/rec/conf/ccs/MellSG16URL#3216769Mohamed Yassine NaghmouchiNancy PerrotNizar KheirAli Ridha MahjoubJean-Philippe WaryA New Risk Assessment Framework Using Graph Theory for Complex ICT Systems.MIST@CCS97-1002016Conference and Workshop Papersclosedconf/ccs/NaghmouchiPKMW16http://dl.acm.org/citation.cfm?id=2995969https://dblp.org/rec/conf/ccs/NaghmouchiPKMW16URL#3216781Simon ParkinAndrew FielderAlex AshbyPragmatic Security: Modelling IT Security Management Responsibilities for SME Archetypes.MIST@CCS69-802016Conference and Workshop Papersclosedconf/ccs/ParkinFA16http://dl.acm.org/citation.cfm?id=2995967https://dblp.org/rec/conf/ccs/ParkinFA16URL#3216795Tabish RashidIoannis AgrafiotisJason R. C. NurseA New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models.MIST@CCS47-562016Conference and Workshop Papersclosedconf/ccs/RashidAN16http://dl.acm.org/citation.cfm?id=2995964https://dblp.org/rec/conf/ccs/RashidAN16URL#3216804Noam ShalevIdit KeidarYosef MoattiYaron WeinsbergWatchIT: Who Watches Your IT Guy?MIST@CCS93-962016Conference and Workshop Papersclosedconf/ccs/ShalevKMW16http://dl.acm.org/citation.cfm?id=2995968https://dblp.org/rec/conf/ccs/ShalevKMW16URL#3216825Fei Song 0001Wei Quan 0001Tianming ZhaoHongke ZhangZiwei HuIlsun YouPorts Distribution Management for Privacy Protection inside Local Domain Name System.MIST@CCS81-872016Conference and Workshop Papersclosedconf/ccs/SongQZZHY16http://dl.acm.org/citation.cfm?id=2995965https://dblp.org/rec/conf/ccs/SongQZZHY16URL#3216842Fulvio ValenzaMarco ValliniAntonio LioyOnline and Offline Security Policy Assessment.MIST@CCS101-1042016Conference and Workshop Papersclosedconf/ccs/ValenzaVL16http://dl.acm.org/citation.cfm?id=2995970https://dblp.org/rec/conf/ccs/ValenzaVL16URL#3216874Markus WurzenbergerFlorian SkopikRoman FiedlerWolfgang KastnerDiscovering Insider Threats from Log Data with High-Performance Bioinformatics Tools.MIST@CCS109-1122016Conference and Workshop Papersclosedconf/ccs/WurzenbergerSFK16http://dl.acm.org/citation.cfm?id=2995973https://dblp.org/rec/conf/ccs/WurzenbergerSFK16URL#3216905Ilsun YouElisa BertinoProceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016MIST@CCSACM2016Editorshipconf/ccs/2016mist10.1145/2995959https://doi.org/10.1145/2995959https://dblp.org/rec/conf/ccs/2016mistURL#3358790