Abstract is missing.
- A Grey-Box Approach for Detecting Malicious User Interactions in Web ApplicationsWafa Ben Jaballah, Nizar Kheir. 1-12 [doi]
- Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control SystemsPeter Mell, James M. Shook, Serban I. Gavrila. 13-22 [doi]
- Towards Formal Analysis of Insider Threats for AuctionsFlorian Kammueller, Manfred Kerber, Christian W. Probst. 23-34 [doi]
- Studying Naive Users and the Insider Threat with SimpleFlowRyan V. Johnson, Jessie Lass, W. Michael Petullo. 35-46 [doi]
- A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov ModelsTabish Rashid, Ioannis Agrafiotis, Jason R. C. Nurse. 47-56 [doi]
- Cyber Deception: Virtual Networks to Defend Insider ReconnaissanceStefan Achleitner, Thomas F. La Porta, Patrick D. McDaniel, Shridatt Sugrim, Srikanth V. Krishnamurthy, Ritu Chadha. 57-68 [doi]
- Pragmatic Security: Modelling IT Security Management Responsibilities for SME ArchetypesSimon Parkin, Andrew Fielder, Alex Ashby. 69-80 [doi]
- Ports Distribution Management for Privacy Protection inside Local Domain Name SystemFei Song, Wei Quan, Tianming Zhao, Hongke Zhang, Ziwei Hu, Ilsun You. 81-87 [doi]
- Function-Based Access Control (FBAC): From Access Control Matrix to Access Control TensorYvo Desmedt, Arash Shaghaghi. 89-92 [doi]
- WatchIT: Who Watches Your IT Guy?Noam Shalev, Idit Keidar, Yosef Moatti, Yaron Weinsberg. 93-96 [doi]
- A New Risk Assessment Framework Using Graph Theory for Complex ICT SystemsM. Yassine Naghmouchi, Nancy Perrot, Nizar Kheir, Ali Ridha Mahjoub, Jean-Philippe Wary. 97-100 [doi]
- Online and Offline Security Policy AssessmentFulvio Valenza, Marco Vallini, Antonio Lioy. 101-104 [doi]
- A Tripwire Grammar for Insider Threat DetectionIoannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese. 105-108 [doi]
- Discovering Insider Threats from Log Data with High-Performance Bioinformatics ToolsMarkus Wurzenberger, Florian Skopik, Roman Fiedler, Wolfgang Kastner. 109-112 [doi]
- Analysis on Manipulation of the MAC Address and Consequent Security ThreatsKyungroul Lee, Hyeungjun Yeuk, Kangbin Yim, Suhyun Kim. 113-117 [doi]