![]() |
|
| MIST'17 Table of Contents MIST'16
Workshop Chairs' Welcome Message MIST'16 Workshop Organization List Session
1: Access Control & Application Security A
Grey-Box Approach for Detecting Malicious User Interactions in Web Applications (Page
1) Restricting
Insider Access Through Efficient Implementation of Multi-Policy Access
Control Systems (Page
13) Towards
Formal Analysis of Insider Threats for Auctions (Page
23) |
|
| (Return to Top) |
Session 2: Best Paper Session Studying
Naïve Users and the Insider Threat with SimpleFlow (Page
35) A
New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov
Models (Page 47) |
| (Return to Top) |
Session 3: Cyber Attacks & Network Security Cyber
Deception: Virtual Networks to Defend Insider Reconnaissance (Page
57) Pragmatic
Security: Modelling IT Security Management Responsibilities for SME
Archetypes (Page
69) Ports
Distribution Management for Privacy Protection inside Local Domain Name
System (Page 81) |
| (Return to Top) |
Session 4: Short Papers Session Function-Based
Access Control (FBAC): From Access Control Matrix to Access Control
Tensor (Page 89) WatchIT:
Who Watches Your IT Guy? (Page
93) A
New Risk Assessment Framework Using Graph Theory for Complex ICT Systems (Page
97) Online
and Offline Security Policy Assessment (Page
101) |
| (Return to Top) | A
Tripwire Grammar for Insider Threat Detection (Page
105) Discovering
Insider Threats from Log Data with High-Performance Bioinformatics Tools (Page
109) Analysis
on Manipulation of the MAC Address and Consequent Security Threats (Page
113) |