Activity Pattern Discovery from Network Captures (English)
- New search for: Lin, Alan C.
- New search for: Peterson, Gilbert L.
- New search for: Lin, Alan C.
- New search for: Peterson, Gilbert L.
In:
2016 IEEE Security and Privacy Workshops (SPW)
;
334-342
;
2016
-
ISBN:
- Conference paper / Electronic Resource
-
Title:Activity Pattern Discovery from Network Captures
-
Contributors:Lin, Alan C. ( author ) / Peterson, Gilbert L. ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2016-05-01
-
Size:693380 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
DataTags, Data Handling Policy Spaces and the Tags LanguageBar-Sinai, Michael / Sweeney, Latanya / Crosas, Merce et al. | 2016
- 9
-
Compliance Monitoring of Third-Party Applications in Online Social NetworksKelbert, Florian / Fromm, Alexander et al. | 2016
- 17
-
Privacy Risk Analysis Based on System Control Structures: Adapting System-Theoretic Process Analysis for Privacy EngineeringShapiro, Stuart S. et al. | 2016
- 25
-
A Semi-Automated Methodology for Extracting Access Control Rules from the European Data Protection DirectiveFatema, Kaniz / Debruyne, Christophe / Lewis, Dave / OSullivan, Declan / Morrison, John P. / Mazed, Abdullah-Al et al. | 2016
- 33
-
A Critical Analysis of Privacy Design StrategiesColesky, Michael / Hoepman, Jaap-Henk / Hillen, Christiaan et al. | 2016
- 41
-
Oblivious Mechanisms in Differential Privacy: Experiments, Conjectures, and Open QuestionsChen, Chien-Lun / Pal, Ranjan / Golubchik, Leana et al. | 2016
- 49
-
Obstacles to Transparency in Privacy EngineeringBrennan-Marquez, Kiel / Susser, Daniel et al. | 2016
- 53
-
From Privacy Impact Assessment to Social Impact AssessmentEdwards, Lilian / McAuley, Derek / Diver, Laurence et al. | 2016
- 58
-
Privacy Harm Analysis: A Case Study on Smart GridsDe, Sourya Joyee / Metayer, Daniel Le et al. | 2016
- 66
-
Improving Performance and Usability in Mobile Keystroke Dynamic Biometric AuthenticationAlshanketi, Faisal / Traore, Issa / Ahmed, Ahmed Awad et al. | 2016
- 74
-
Detection of Mobile Malware: An Artificial Immunity ApproachBrown, James / Anwar, Mohd / Dozier, Gerry et al. | 2016
- 81
-
Polymorphic Malware Detection Using Sequence Classification MethodsDrew, Jake / Moore, Tyler / Hahsler, Michael et al. | 2016
- 88
-
LINEBACKER: LINE-Speed Bio-Inspired Analysis and Characterization for Event RecognitionOehmen, Christopher S. / Bruillard, Paul J. / Matzke, Brett D. / Phillips, Aaron R. / Star, Keith T. / Jensen, Jeffrey L. / Nordwall, Doug / Thompson, Seth / Peterson, Elena S. et al. | 2016
- 96
-
MIGRATE: Towards a Lightweight Moving-Target Defense Against Cloud Side-ChannelsAzab, Mohamed / Eltoweissy, Mohamed et al. | 2016
- 104
-
Ecology-Based DoS Attack in Cognitive Radio NetworksCheng, Shin-Ming / Chen, Pin-Yu et al. | 2016
- 111
-
Hunting Bugs with Lévy Flight ForagingBottinger, Konstantin et al. | 2016
- 118
-
A Biosequence-Based Approach to Software CharacterizationOehmen, Christopher S. / Peterson, Elena S. / Phillips, Aaron R. / Curtis, Darren S. et al. | 2016
- 126
-
Caradoc: A Pragmatic Approach to PDF Parsing and ValidationEndignoux, Guillaume / Levillain, Olivier / Migeon, Jean-Yves et al. | 2016
- 140
-
In Search of Shotgun Parsers in Android ApplicationsUnderwood, Katherine / Locasto, Michael E. et al. | 2016
- 156
-
An Incremental Learner for Language-Based Anomaly Detection in XMLLampesberger, Harald et al. | 2016
- 171
-
Grammatical Inference and Machine Learning Approaches to Post-Hoc LangSecCurley, Sheridan S. / Harang, Richard E. et al. | 2016
- 179
-
A Posteriori Taint-Tracking for Demonstrating Non-interference in Expressive Low-Level LanguagesAldous, Peter / Might, Matthew et al. | 2016
- 185
-
Research Report: Analysis of Software for Restricted Computational Environment ApplicabilityTorrey, Jacob I. / Miodownik, Jonathan et al. | 2016
- 198
-
Declarative Verifiable SDI SpecificationsMcGeer, Rick et al. | 2016
- 204
-
Target Fragmentation in Android AppsMutchler, Patrick / Safaei, Yeganeh / Doupe, Adam / Mitchell, John et al. | 2016
- 214
-
Perceptions of Risk in Mobile TransactionTrewin, Shari / Swart, Cal / Koved, Larry / Singh, Kapil et al. | 2016
- 224
-
A Study of Grayware on Google PlayAndow, Benjamin / Nadkarni, Adwait / Bassett, Blake / Enck, William / Xie, Tao et al. | 2016
- 234
-
Browser History Stealing with Captive Wi-Fi PortalsDabrowski, Adrian / Merzdovnik, Georg / Kommenda, Nikolaus / Weippl, Edgar et al. | 2016
- 241
-
Sensor-Based Mobile Web Fingerprinting and Cross-Site Input Inference AttacksYue, Chuan et al. | 2016
- 245
-
Is Anybody Home? Inferring Activity From Smart Home Network TrafficCopos, Bogdan / Levitt, Karl / Bishop, Matt / Rowe, Jeff et al. | 2016
- 252
-
DroidScribe: Classifying Android Malware Based on Runtime BehaviorDash, Santanu Kumar / Suarez-Tangil, Guillermo / Khan, Salahuddin / Tam, Kimberly / Ahmadi, Mansour / Kinder, Johannes / Cavallaro, Lorenzo et al. | 2016
- 262
-
Analysis of Code Heterogeneity for High-Precision Classification of Repackaged MalwareTian, Ke / Yao, Danfeng / Ryder, Barbara G. / Tan, Gang et al. | 2016
- 272
-
At Your Fingertips: Considering Finger Distinctness in Continuous Touch-Based Authentication for Mobile DevicesAli, Zaire / Payton, Jamie / Sritapan, Vincent et al. | 2016
- 276
-
Hold and Sign: A Novel Behavioral Biometrics for Smartphone User AuthenticationBuriro, Attaullah / Crispo, Bruno / Delfrari, Filippo / Wrona, Konrad et al. | 2016
- 286
-
Validating an Insider Threat Detection System: A Real Scenario PerspectiveAgrafiotis, Ioannis / Erola, Arnau / Happa, Jassim / Goldsmith, Michael / Creese, Sadie et al. | 2016
- 296
-
PRI: Privacy Preserving Inspection of Encrypted Network TrafficSchiff, Liron / Schmid, Stefan et al. | 2016
- 304
-
Investigating Airplane Safety and Security Against Insider Threats Using Logical ModelingKammuller, Florian / Kerber, Manfred et al. | 2016
- 314
-
A Model-Based Approach to Predicting the Performance of Insider Threat Detection SystemsRoberts, Shannon C. / Holodnak, John T. / Nguyen, Trang / Yuditskaya, Sophia / Milosavljevic, Maja / Streilein, William W. et al. | 2016
- 324
-
A Hybrid Framework for Data Loss Prevention and DetectionCostante, Elisa / Fauri, Davide / Etalle, Sandro / Hartog, Jerry Den / Zannone, Nicola et al. | 2016
- 334
-
Activity Pattern Discovery from Network CapturesLin, Alan C. / Peterson, Gilbert L. et al. | 2016
- 343
-
Author Index| 2016
- 346
-
Publisher's Information| 2016
- C4
-
Cover Art| 2016
- i
-
Title Page i| 2016
- iii
-
Title Page iii| 2016
- iv
-
Copyright Page| 2016
- ix
-
Message from the General Chair| 2016
- v
-
Table of Contents| 2016
- xii
-
Introduction to IWPE| 2016
- xiii
-
IWPE Committees| 2016
- xix
-
Introduction to MoST| 2016
- xv
-
Introduction to BioSTAR| 2016
- xvi
-
BioSTAR Committees| 2016
- xvii
-
Introduction to LangSec| 2016
- xviii
-
LangSec Committees| 2016
- xx
-
MoST Committees| 2016
- xxi
-
Introduction to WRIT| 2016
- xxii
-
WRIT Committees| 2016