Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SPW
SPW 2012
Generate Citations
2012 IEEE Symposium on Security and Privacy Workshops
May 24 2012 to May 25 2012
San Francisco, CA USA
ISBN: 978-0-7695-4740-4
Table of Contents
Papers
Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching
Freely available from IEEE.
pp. 33-44
by
M. Rostami
,
M. Majzoobi
,
F. Koushanfar
,
D. S. Wallach
,
S. Devadas
Papers
Policy Aware Social Miner
Freely available from IEEE.
pp. 53-59
by
O. Seneviratne
,
S. Paradesi
,
L. Kagal
Papers
WSCS 2012 Program Committee
Freely available from IEEE.
pp. xv
Papers
A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem
Freely available from IEEE.
pp. 1-11
by
R. Nithyanand
,
J. Solis
Papers
Side-Channel Analysis of Grøstl and Skein
Freely available from IEEE.
pp. 16-26
by
S. Lévêque
,
C. Boura
,
D. Vigilant
Papers
A Knowledge-Based Approach to Intrusion Detection Modeling
Freely available from IEEE.
pp. 75-81
by
S. More
,
M. Matthews
,
A. Joshi
,
T. Finin
Papers
Using Consensus Clustering for Multi-view Anomaly Detection
Freely available from IEEE.
pp. 117-124
by
A. Y. Liu
,
D. N. Lam
Papers
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
Freely available from IEEE.
pp. 125-128
by
S. J. Stolfo
,
M. B. Salem
,
A. D. Keromytis
Papers
[Title page iii]
Freely available from IEEE.
pp. iii
Papers
Privacy in Online Review Sites
Freely available from IEEE.
pp. 45-52
by
M. Burkholder
,
R. Greenstadt
Papers
A Framework for Modeling Decision Making and Deception with Semantic Information
Freely available from IEEE.
pp. 68-74
by
C. Griffin
,
K. Moore
Papers
Towards a Semantics of Phish
Freely available from IEEE.
pp. 91-96
by
H. Orman
Papers
Proactive Insider Threat Detection through Graph Learning and Psychological Context
Freely available from IEEE.
pp. 142-149
by
B. Price
,
Juan Liu
,
O. Brdiczka
,
Jianqiang Shen
,
A. Patil
,
R. Chow
,
E. Bart
,
N. Ducheneaut
Papers
Forensic Methods for Detecting Insider Turning Behaviors
Freely available from IEEE.
pp. 150-158
by
F. Cohen
Papers
Copyright (c) 2012 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved. [Copyright page]
Freely available from IEEE.
pp. iv
Papers
TrustED 2012 Program Committee
Freely available from IEEE.
pp. xii
Papers
Preface - WSCS 2012
Freely available from IEEE.
pp. xiv
by
Alessandro Armando
,
Hilarie Orman
Papers
WSCS 2012 External Reviewers
Freely available from IEEE.
pp. xvi
Papers
A Method for Preventing "Skipping" Attacks
Freely available from IEEE.
pp. 12-15
by
M. Joye
Papers
SPW 2012 Conference Organizers
Freely available from IEEE.
pp. x
Papers
The BlueJay Ultra-Lightweight Hybrid Cryptosystem
Freely available from IEEE.
pp. 27-32
by
M-J O. Saarinen
Papers
Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context Modeling
Freely available from IEEE.
pp. 82-85
by
A. Joshi
,
D. Ghosh
,
T. Finin
,
P. Jagtap
Papers
Implementing Mental Models
Freely available from IEEE.
pp. 86-90
by
J. Blythe
,
L. J. Camp
Papers
User Intention-Based Traffic Dependence Analysis for Anomaly Detection
Freely available from IEEE.
pp. 104-112
by
Danfeng Yao
,
W. Banick
,
Hao Zhang
,
N. Ramakrishnan
Papers
Decision Support Procedure in the Insider Threat Domain
Freely available from IEEE.
pp. 159-163
by
J. P. Murphy
,
V. H. Berk
,
I. Gregorio-de Souza
Papers
Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers
Freely available from IEEE.
pp. 97-103
by
J. Navarro
,
E. Naudon
,
D. Oliveira
Papers
IEEE CS Security and Privacy Workshops - SPW 2012 - Table of contents
Freely available from IEEE.
pp. v-vii
Papers
Preface - TrustED 2012
Freely available from IEEE.
pp. xi
Papers
TrustED 2012 External Reviewers
Freely available from IEEE.
pp. xiii
Papers
Preface - WRIT 2012
Freely available from IEEE.
pp. xvii
by
Cybenko
,
Moore
Papers
Semantic Comparison of Security Policies: From Access Control Policies to Flow Properties
Freely available from IEEE.
pp. 60-67
by
M. Jaume
Papers
Lost in Translation: Improving Decoy Documents via Automated Translation
Freely available from IEEE.
pp. 129-133
by
J. Voris
,
N. Boggs
,
S. J. Stolfo
Papers
Author index
Freely available from IEEE.
pp. 164
Papers
[Title page i]
Freely available from IEEE.
pp. i
Papers
Message from the General Chair - SPW 2012
Freely available from IEEE.
pp. viii-ix
by
Dietrich
Papers
Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results
Freely available from IEEE.
pp. 113-116
by
C. Griffin
,
A. Squicciarini
Papers
Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks
Freely available from IEEE.
pp. 134-141
by
Youngho Cho
,
Gang Qu
,
Yuanming Wu
IEEE Computer Society Technical & Conference Activities Board [Publisher's information]
Freely available from IEEE.
pp. 166-166
Showing 38 out of 38