BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
secur (11)
analysi (5)
inform (5)
assess (4)
system (4)

Stem threat$ (all stems)

32 papers:

ICEISICEIS-v2-2015-AlahmadiLN #detection #internet #process #profiling #using
Using Internet Activity Profiling for Insider-threat Detection (BAA, PAL, JRCN), pp. 709–720.
REFSQREFSQ-2015-GramaticaLMPT #assessment #empirical #risk management #security
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals (MdG, KL, FM, FP, AT), pp. 98–114.
ICSTICST-2015-CarboneCPP #identification #security #testing
Security Threat Identification and Testing (RC, LC, AP, SEP), pp. 1–8.
DACDAC-2014-AncajasCR #named
Fort-NoCs: Mitigating the Threat of a Compromised NoC (DMA, KC, SR), p. 6.
DATEDATE-2014-XuB #hybrid #question
Hybrid side-channel/machine-learning attacks on PUFs: A new threat? (XX, WB), pp. 1–6.
LISPILC-2014-LevineY #analysis #assessment #profiling
Leadership Trait Analysis and Threat Assessment with Profiler Plus (NL, MY), p. 50.
CSCWCSCW-2014-LaseckiTK #information management
Information extraction and manipulation threats in crowd-powered systems (WSL, JT, EK), pp. 248–256.
CSCWCSCW-2014-LittSBHSR #facebook #self
Awkward encounters of an “other” kind: collective self-presentation and face threat on facebook (EL, ELS, JPB, JTH, MES, LR), pp. 449–460.
KDDKDD-2014-Mullainathan #machine learning #question #social
Bugbears or legitimate threats?: (social) scientists’ criticisms of machine learning? (SM), p. 4.
SEKESEKE-2014-NetoC #identification
Identifying Threats to Validity and Control Actions in the Planning Stages of Controlled Experiments (AAN, TC), pp. 256–261.
CHICHI-2013-LiaoF #interactive #topic
Beyond the filter bubble: interactive effects of perceived threat and topic involvement on selective exposure to information (QVL, WTF), pp. 2359–2368.
KDDKDD-2013-SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ #database #detection #process
Detecting insider threats in a real corporate database of computer usage activity (TES, HGG, AM, WTY, BR, RP, DH, MR, DAB, EC, IAE, JJ, VB, DHC, OG, OK, AZ, EB, RLMI, RM, LW, TGD, AF, WKW, SD, AE, JI, JYL, DK, CF, DDC, LF, AG, DJ), pp. 1393–1401.
SACSAC-2013-CarlosMPC #security
An updated threat model for security ceremonies (MCC, JEM, GP, RFC), pp. 1836–1843.
ESEC-FSEESEC-FSE-2013-VasquezBBPOP #android #api #fault
API change and fault proneness: a threat to the success of Android apps (MLV, GB, CBC, MDP, RO, DP), pp. 477–487.
ISSTAISSTA-2013-SteimannFA #empirical #fault
Threats to the validity and value of empirical assessments of the accuracy of coverage-based fault locators (FS, MF, RA), pp. 314–324.
ITiCSEITiCSE-2012-Kumar #case study
A study of stereotype threat in computer science (ANK), pp. 273–278.
SACSAC-2012-SchaadB #analysis #automation #named
TAM2: automated threat analysis (AS, MB), pp. 1103–1108.
HCIHIMI-v1-2011-LifOLHS #multimodal
Multimodal Threat Cueing in Simulated Combat Vehicle with Tactile Information Switching between Threat and Waypoint Indication (PL, PAO, BL, JH, JS), pp. 454–461.
SEKESEKE-2011-SanfordWX #analysis #modelling #security #using
Security Analysis of FileZilla Server Using Threat Models (MS, DW, DX), pp. 678–682.
ISSTAISSTA-2011-NaminK #testing
The use of mutation in testing experiments and its sensitivity to external threats (ASN, SK), pp. 342–352.
CSCWCSCW-2010-StarbirdPHV #microblog #social #what
Chatter on the red: what hazards threat reveals about the social life of microblogged information (KS, LP, ALH, SV), pp. 241–250.
SEKESEKE-2010-FeldtM #bibliography #empirical #re-engineering #research
Validity Threats in Empirical Software Engineering Research — An Initial Survey (RF, AM), pp. 374–379.
VLDBVLDB-2008-Miao #monitoring #named
GS-TMS: a global stream-based threat monitor system (JM), pp. 1644–1651.
ASEASE-2007-Abi-AntounWT #consistency #data flow #diagrams #implementation #modelling #security
Checking threat modeling data flow diagrams for implementation conformance and security (MAA, DW, PT), pp. 393–396.
SIGMODSIGMOD-2007-StahlbergML #analysis #database #forensics #privacy
Threats to privacy in the forensic analysis of database systems (PS, GM, BNL), pp. 91–102.
POPLPOPL-2007-Malacaria #security
Assessing security threats of looping constructs (PM), pp. 225–235.
WCREWCRE-2006-MerloLA #analysis #injection #php #sql
Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP (EM, DL, GA), pp. 147–156.
ASEASE-2005-XuN #approach #modelling #verification
A threat-driven approach to modeling and verifying secure software (DX, KEN), pp. 342–346.
ICEISICEIS-v3-2005-XuP #architecture #design #information management
Threat-Driven Architectural Design of Secure Information Systems (DX, JJP), pp. 136–143.
CIKMCIKM-2003-NicolaJ #database #parsing #performance #xml
XML parsing: a threat to database performance (MN, JJ), pp. 175–178.
ICSMEICSM-2000-BasharKKSW #security #tool support
Low-threat security patches and tools (MAB, GK, MGK, EHS, SSWJ), pp. 306–313.
KDDKDD-1991-OLeary #database #information management #security
Knowledge Discovery as a Threat to Database Security (DEO), pp. 507–516.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.