Search dblp for Publications

export results for "toc:db/conf/sp/spw2012.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sp/BlytheC12,
  author       = {Jim Blythe and
                  L. Jean Camp},
  title        = {Implementing Mental Models},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {86--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.31},
  doi          = {10.1109/SPW.2012.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BlytheC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BouraLV12,
  author       = {Christina Boura and
                  Sylvain L{\'{e}}v{\^{e}}que and
                  David Vigilant},
  title        = {Side-Channel Analysis of Gr{\o}stl and Skein},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {16--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.13},
  doi          = {10.1109/SPW.2012.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BouraLV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BrdiczkaLPSPCBD12,
  author       = {Oliver Brdiczka and
                  Juan Liu and
                  Bob Price and
                  Jianqiang Shen and
                  Akshay Patil and
                  Richard Chow and
                  Eugene Bart and
                  Nicolas Ducheneaut},
  title        = {Proactive Insider Threat Detection through Graph Learning and Psychological
                  Context},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {142--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.29},
  doi          = {10.1109/SPW.2012.29},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BrdiczkaLPSPCBD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BurkholderG12,
  author       = {Matthew Burkholder and
                  Rachel Greenstadt},
  title        = {Privacy in Online Review Sites},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {45--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.23},
  doi          = {10.1109/SPW.2012.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BurkholderG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChoQW12,
  author       = {Youngho Cho and
                  Gang Qu and
                  Yuanming Wu},
  title        = {Insider Threats against Trust Mechanism with Watchdog and Defending
                  Approaches in Wireless Sensor Networks},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {134--141},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.32},
  doi          = {10.1109/SPW.2012.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChoQW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Cohen12,
  author       = {Fred Cohen},
  title        = {Forensic Methods for Detecting Insider Turning Behaviors},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {150--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.21},
  doi          = {10.1109/SPW.2012.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Cohen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GhoshJFJ12,
  author       = {Dibyajyoti Ghosh and
                  Anupam Joshi and
                  Tim Finin and
                  Pramod Jagtap},
  title        = {Privacy Control in Smart Phones Using Semantically Rich Reasoning
                  and Context Modeling},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {82--85},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.27},
  doi          = {10.1109/SPW.2012.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GhoshJFJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GriffinM12,
  author       = {Christopher Griffin and
                  Kathleen A. Moore},
  title        = {A Framework for Modeling Decision Making and Deception with Semantic
                  Information},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {68--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.25},
  doi          = {10.1109/SPW.2012.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GriffinM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GriffinS12,
  author       = {Christopher Griffin and
                  Anna Cinzia Squicciarini},
  title        = {Toward a Game Theoretic Model of Information Release in Social Media
                  with Experimental Results},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {113--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.24},
  doi          = {10.1109/SPW.2012.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GriffinS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Jaume12,
  author       = {Mathieu Jaume},
  title        = {Semantic Comparison of Security Policies: From Access Control Policies
                  to Flow Properties},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {60--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.33},
  doi          = {10.1109/SPW.2012.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Jaume12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Joye12,
  author       = {Marc Joye},
  title        = {A Method for Preventing "Skipping" Attacks},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {12--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.14},
  doi          = {10.1109/SPW.2012.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Joye12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiuL12,
  author       = {Alexander Y. Liu and
                  Dung N. Lam},
  title        = {Using Consensus Clustering for Multi-view Anomaly Detection},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {117--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.18},
  doi          = {10.1109/SPW.2012.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LiuL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MajzoobiRKWD12,
  author       = {Mehrdad Majzoobi and
                  Masoud Rostami and
                  Farinaz Koushanfar and
                  Dan S. Wallach and
                  Srinivas Devadas},
  title        = {Slender {PUF} Protocol: {A} Lightweight, Robust, and Secure Authentication
                  by Substring Matching},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {33--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.30},
  doi          = {10.1109/SPW.2012.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MajzoobiRKWD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MoreMJF12,
  author       = {Sumit More and
                  Mary Matthews and
                  Anupam Joshi and
                  Tim Finin},
  title        = {A Knowledge-Based Approach to Intrusion Detection Modeling},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {75--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.26},
  doi          = {10.1109/SPW.2012.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MoreMJF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MurphyBS12,
  author       = {John P. Murphy and
                  Vincent H. Berk and
                  Ian D. Gregorio{-}De Souza},
  title        = {Decision Support Procedure in the Insider Threat Domain},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {159--163},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.17},
  doi          = {10.1109/SPW.2012.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MurphyBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NavarroNO12,
  author       = {Jes{\'{u}}s Navarro and
                  Enrique Naudon and
                  Daniela Oliveira},
  title        = {Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {97--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.22},
  doi          = {10.1109/SPW.2012.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/NavarroNO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NithyanandS12,
  author       = {Rishab Nithyanand and
                  John Solis},
  title        = {A Theoretical Analysis: Physical Unclonable Functions and the Software
                  Protection Problem},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {1--11},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.16},
  doi          = {10.1109/SPW.2012.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/NithyanandS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Orman12,
  author       = {Hilarie Orman},
  title        = {Towards a Semantics of Phish},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {91--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.12},
  doi          = {10.1109/SPW.2012.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Orman12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ParadesiSK12,
  author       = {Sharon Paradesi and
                  Oshani Seneviratne and
                  Lalana Kagal},
  title        = {Policy Aware Social Miner},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {53--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.28},
  doi          = {10.1109/SPW.2012.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ParadesiSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Saarinen12,
  author       = {Markku{-}Juhani O. Saarinen},
  title        = {The BlueJay Ultra-Lightweight Hybrid Cryptosystem},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {27--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.11},
  doi          = {10.1109/SPW.2012.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Saarinen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/StolfoSK12,
  author       = {Salvatore J. Stolfo and
                  Malek Ben Salem and
                  Angelos D. Keromytis},
  title        = {Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {125--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.19},
  doi          = {10.1109/SPW.2012.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/StolfoSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VorisBS12,
  author       = {Jonathan Voris and
                  Nathaniel Boggs and
                  Salvatore J. Stolfo},
  title        = {Lost in Translation: Improving Decoy Documents via Automated Translation},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {129--133},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.20},
  doi          = {10.1109/SPW.2012.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/VorisBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangBYR12,
  author       = {Hao Zhang and
                  William Banick and
                  Danfeng Yao and
                  Naren Ramakrishnan},
  title        = {User Intention-Based Traffic Dependence Analysis for Anomaly Detection},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {104--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.15},
  doi          = {10.1109/SPW.2012.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangBYR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2012w,
  title        = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6226981/proceeding},
  isbn         = {978-1-4673-2157-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/2012w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics