32 papers:
- ICEIS-v2-2015-AlahmadiLN #detection #internet #process #profiling #using
- Using Internet Activity Profiling for Insider-threat Detection (BAA, PAL, JRCN), pp. 709–720.
- REFSQ-2015-GramaticaLMPT #assessment #empirical #risk management #security
- The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals (MdG, KL, FM, FP, AT), pp. 98–114.
- ICST-2015-CarboneCPP #identification #security #testing
- Security Threat Identification and Testing (RC, LC, AP, SEP), pp. 1–8.
- DAC-2014-AncajasCR #named
- Fort-NoCs: Mitigating the Threat of a Compromised NoC (DMA, KC, SR), p. 6.
- DATE-2014-XuB #hybrid #question
- Hybrid side-channel/machine-learning attacks on PUFs: A new threat? (XX, WB), pp. 1–6.
- ILC-2014-LevineY #analysis #assessment #profiling
- Leadership Trait Analysis and Threat Assessment with Profiler Plus (NL, MY), p. 50.
- CSCW-2014-LaseckiTK #information management
- Information extraction and manipulation threats in crowd-powered systems (WSL, JT, EK), pp. 248–256.
- CSCW-2014-LittSBHSR #facebook #self
- Awkward encounters of an “other” kind: collective self-presentation and face threat on facebook (EL, ELS, JPB, JTH, MES, LR), pp. 449–460.
- KDD-2014-Mullainathan #machine learning #question #social
- Bugbears or legitimate threats?: (social) scientists’ criticisms of machine learning? (SM), p. 4.
- SEKE-2014-NetoC #identification
- Identifying Threats to Validity and Control Actions in the Planning Stages of Controlled Experiments (AAN, TC), pp. 256–261.
- CHI-2013-LiaoF #interactive #topic
- Beyond the filter bubble: interactive effects of perceived threat and topic involvement on selective exposure to information (QVL, WTF), pp. 2359–2368.
- KDD-2013-SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ #database #detection #process
- Detecting insider threats in a real corporate database of computer usage activity (TES, HGG, AM, WTY, BR, RP, DH, MR, DAB, EC, IAE, JJ, VB, DHC, OG, OK, AZ, EB, RLMI, RM, LW, TGD, AF, WKW, SD, AE, JI, JYL, DK, CF, DDC, LF, AG, DJ), pp. 1393–1401.
- SAC-2013-CarlosMPC #security
- An updated threat model for security ceremonies (MCC, JEM, GP, RFC), pp. 1836–1843.
- ESEC-FSE-2013-VasquezBBPOP #android #api #fault
- API change and fault proneness: a threat to the success of Android apps (MLV, GB, CBC, MDP, RO, DP), pp. 477–487.
- ISSTA-2013-SteimannFA #empirical #fault
- Threats to the validity and value of empirical assessments of the accuracy of coverage-based fault locators (FS, MF, RA), pp. 314–324.
- ITiCSE-2012-Kumar #case study
- A study of stereotype threat in computer science (ANK), pp. 273–278.
- SAC-2012-SchaadB #analysis #automation #named
- TAM2: automated threat analysis (AS, MB), pp. 1103–1108.
- HIMI-v1-2011-LifOLHS #multimodal
- Multimodal Threat Cueing in Simulated Combat Vehicle with Tactile Information Switching between Threat and Waypoint Indication (PL, PAO, BL, JH, JS), pp. 454–461.
- SEKE-2011-SanfordWX #analysis #modelling #security #using
- Security Analysis of FileZilla Server Using Threat Models (MS, DW, DX), pp. 678–682.
- ISSTA-2011-NaminK #testing
- The use of mutation in testing experiments and its sensitivity to external threats (ASN, SK), pp. 342–352.
- CSCW-2010-StarbirdPHV #microblog #social #what
- Chatter on the red: what hazards threat reveals about the social life of microblogged information (KS, LP, ALH, SV), pp. 241–250.
- SEKE-2010-FeldtM #bibliography #empirical #re-engineering #research
- Validity Threats in Empirical Software Engineering Research — An Initial Survey (RF, AM), pp. 374–379.
- VLDB-2008-Miao #monitoring #named
- GS-TMS: a global stream-based threat monitor system (JM), pp. 1644–1651.
- ASE-2007-Abi-AntounWT #consistency #data flow #diagrams #implementation #modelling #security
- Checking threat modeling data flow diagrams for implementation conformance and security (MAA, DW, PT), pp. 393–396.
- SIGMOD-2007-StahlbergML #analysis #database #forensics #privacy
- Threats to privacy in the forensic analysis of database systems (PS, GM, BNL), pp. 91–102.
- POPL-2007-Malacaria #security
- Assessing security threats of looping constructs (PM), pp. 225–235.
- WCRE-2006-MerloLA #analysis #injection #php #sql
- Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP (EM, DL, GA), pp. 147–156.
- ASE-2005-XuN #approach #modelling #verification
- A threat-driven approach to modeling and verifying secure software (DX, KEN), pp. 342–346.
- ICEIS-v3-2005-XuP #architecture #design #information management
- Threat-Driven Architectural Design of Secure Information Systems (DX, JJP), pp. 136–143.
- CIKM-2003-NicolaJ #database #parsing #performance #xml
- XML parsing: a threat to database performance (MN, JJ), pp. 175–178.
- ICSM-2000-BasharKKSW #security #tool support
- Low-threat security patches and tools (MAB, GK, MGK, EHS, SSWJ), pp. 306–313.
- KDD-1991-OLeary #database #information management #security
- Knowledge Discovery as a Threat to Database Security (DEO), pp. 507–516.