Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sp/spw2012.bht:"
@inproceedings{DBLP:conf/sp/BlytheC12, author = {Jim Blythe and L. Jean Camp}, title = {Implementing Mental Models}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {86--90}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.31}, doi = {10.1109/SPW.2012.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BlytheC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BouraLV12, author = {Christina Boura and Sylvain L{\'{e}}v{\^{e}}que and David Vigilant}, title = {Side-Channel Analysis of Gr{\o}stl and Skein}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {16--26}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.13}, doi = {10.1109/SPW.2012.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BouraLV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BrdiczkaLPSPCBD12, author = {Oliver Brdiczka and Juan Liu and Bob Price and Jianqiang Shen and Akshay Patil and Richard Chow and Eugene Bart and Nicolas Ducheneaut}, title = {Proactive Insider Threat Detection through Graph Learning and Psychological Context}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {142--149}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.29}, doi = {10.1109/SPW.2012.29}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BrdiczkaLPSPCBD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BurkholderG12, author = {Matthew Burkholder and Rachel Greenstadt}, title = {Privacy in Online Review Sites}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {45--52}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.23}, doi = {10.1109/SPW.2012.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BurkholderG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChoQW12, author = {Youngho Cho and Gang Qu and Yuanming Wu}, title = {Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {134--141}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.32}, doi = {10.1109/SPW.2012.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChoQW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Cohen12, author = {Fred Cohen}, title = {Forensic Methods for Detecting Insider Turning Behaviors}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {150--158}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.21}, doi = {10.1109/SPW.2012.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Cohen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GhoshJFJ12, author = {Dibyajyoti Ghosh and Anupam Joshi and Tim Finin and Pramod Jagtap}, title = {Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context Modeling}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {82--85}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.27}, doi = {10.1109/SPW.2012.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/GhoshJFJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GriffinM12, author = {Christopher Griffin and Kathleen A. Moore}, title = {A Framework for Modeling Decision Making and Deception with Semantic Information}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {68--74}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.25}, doi = {10.1109/SPW.2012.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/GriffinM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GriffinS12, author = {Christopher Griffin and Anna Cinzia Squicciarini}, title = {Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {113--116}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.24}, doi = {10.1109/SPW.2012.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/GriffinS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Jaume12, author = {Mathieu Jaume}, title = {Semantic Comparison of Security Policies: From Access Control Policies to Flow Properties}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {60--67}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.33}, doi = {10.1109/SPW.2012.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Jaume12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Joye12, author = {Marc Joye}, title = {A Method for Preventing "Skipping" Attacks}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {12--15}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.14}, doi = {10.1109/SPW.2012.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Joye12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiuL12, author = {Alexander Y. Liu and Dung N. Lam}, title = {Using Consensus Clustering for Multi-view Anomaly Detection}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {117--124}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.18}, doi = {10.1109/SPW.2012.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LiuL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MajzoobiRKWD12, author = {Mehrdad Majzoobi and Masoud Rostami and Farinaz Koushanfar and Dan S. Wallach and Srinivas Devadas}, title = {Slender {PUF} Protocol: {A} Lightweight, Robust, and Secure Authentication by Substring Matching}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {33--44}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.30}, doi = {10.1109/SPW.2012.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MajzoobiRKWD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MoreMJF12, author = {Sumit More and Mary Matthews and Anupam Joshi and Tim Finin}, title = {A Knowledge-Based Approach to Intrusion Detection Modeling}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {75--81}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.26}, doi = {10.1109/SPW.2012.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MoreMJF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MurphyBS12, author = {John P. Murphy and Vincent H. Berk and Ian D. Gregorio{-}De Souza}, title = {Decision Support Procedure in the Insider Threat Domain}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {159--163}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.17}, doi = {10.1109/SPW.2012.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MurphyBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NavarroNO12, author = {Jes{\'{u}}s Navarro and Enrique Naudon and Daniela Oliveira}, title = {Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {97--103}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.22}, doi = {10.1109/SPW.2012.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/NavarroNO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NithyanandS12, author = {Rishab Nithyanand and John Solis}, title = {A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {1--11}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.16}, doi = {10.1109/SPW.2012.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/NithyanandS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Orman12, author = {Hilarie Orman}, title = {Towards a Semantics of Phish}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {91--96}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.12}, doi = {10.1109/SPW.2012.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Orman12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ParadesiSK12, author = {Sharon Paradesi and Oshani Seneviratne and Lalana Kagal}, title = {Policy Aware Social Miner}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {53--59}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.28}, doi = {10.1109/SPW.2012.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ParadesiSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Saarinen12, author = {Markku{-}Juhani O. Saarinen}, title = {The BlueJay Ultra-Lightweight Hybrid Cryptosystem}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {27--32}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.11}, doi = {10.1109/SPW.2012.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Saarinen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/StolfoSK12, author = {Salvatore J. Stolfo and Malek Ben Salem and Angelos D. Keromytis}, title = {Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {125--128}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.19}, doi = {10.1109/SPW.2012.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/StolfoSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/VorisBS12, author = {Jonathan Voris and Nathaniel Boggs and Salvatore J. Stolfo}, title = {Lost in Translation: Improving Decoy Documents via Automated Translation}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {129--133}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.20}, doi = {10.1109/SPW.2012.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/VorisBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangBYR12, author = {Hao Zhang and William Banick and Danfeng Yao and Naren Ramakrishnan}, title = {User Intention-Based Traffic Dependence Analysis for Anomaly Detection}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {104--112}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.15}, doi = {10.1109/SPW.2012.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhangBYR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/2012w, title = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6226981/proceeding}, isbn = {978-1-4673-2157-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/2012w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.