15 | -- | 0 | Mario Frank, Joachim M. Buhmann, David A. Basin. Role Mining with Probabilistic Models |
16 | -- | 0 | Yossi Gilad, Amir Herzberg. Fragmentation Considered Vulnerable |
17 | -- | 0 | Muhammad Qasim Ali, Ehab Al-Shaer, Hassan Khan, Syed Ali Khayam. Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning |
18 | -- | 0 | Karthick Jayaraman, Mahesh V. Tripunitara, Vijay Ganesh, Martin C. Rinard, Steve J. Chapin. Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies |