default search action
Search dblp for Publications
export results for "toc:db/conf/safeconfig/safeconfig2014.bht:"
@inproceedings{DBLP:conf/safeconfig/AlsalehA14, author = {Mohammed Noraden Alsaleh and Ehab Al{-}Shaer}, editor = {Ehab Al{-}Shaer and Krishna Kant}, title = {Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring Systems}, booktitle = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {25--28}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665936.2665941}, doi = {10.1145/2665936.2665941}, timestamp = {Thu, 13 Feb 2020 15:16:46 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/AlsalehA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/Bauer14, author = {Lujo Bauer}, editor = {Ehab Al{-}Shaer and Krishna Kant}, title = {Human Factors, Defaults, and Automation: Challenges and Opporunities}, booktitle = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {37}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665936.2668880}, doi = {10.1145/2665936.2668880}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/Bauer14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/ChenNDH14, author = {Ping Chen and Nick Nikiforakis and Lieven Desmet and Christophe Huygens}, editor = {Ehab Al{-}Shaer and Krishna Kant}, title = {Security Analysis of the Chinese Web: How well is it protected?}, booktitle = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {3--9}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665936.2665938}, doi = {10.1145/2665936.2665938}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/ChenNDH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/GillaniA14, author = {Fida Gillani and Ehab Al{-}Shaer}, editor = {Ehab Al{-}Shaer and Krishna Kant}, title = {Improving Efficiency of Spam Detection using Economic Model}, booktitle = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {11--18}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665936.2665942}, doi = {10.1145/2665936.2665942}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/GillaniA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/Gunter14, author = {Carl A. Gunter}, editor = {Ehab Al{-}Shaer and Krishna Kant}, title = {Detecting Roles and Anomalies in Hospital Access Audit Logs}, booktitle = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665936.2668879}, doi = {10.1145/2665936.2668879}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/Gunter14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/SunJ14, author = {Kun Sun and Sushil Jajodia}, editor = {Ehab Al{-}Shaer and Krishna Kant}, title = {Protecting Enterprise Networks through Attack Surface Expansion}, booktitle = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {29--32}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665936.2665939}, doi = {10.1145/2665936.2665939}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/SunJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/TanakaG14, author = {Yasuyuki Tanaka and Atsuhiro Goto}, editor = {Ehab Al{-}Shaer and Krishna Kant}, title = {n-ROPdetector: Proposal of a Method to Detect the {ROP} Attack Code on the Network}, booktitle = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {33--36}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665936.2665937}, doi = {10.1145/2665936.2665937}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/TanakaG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/TateC14, author = {Jeremy Tate and T. Charles Clancy}, editor = {Ehab Al{-}Shaer and Krishna Kant}, title = {Secure and Tamper Proof Code Management}, booktitle = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {19--24}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665936.2665940}, doi = {10.1145/2665936.2665940}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/TateC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/safeconfig/2014, editor = {Ehab Al{-}Shaer and Krishna Kant}, title = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665936}, doi = {10.1145/2665936}, isbn = {978-1-4503-3147-0}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.