Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques
Reducing the Risk of Insider Misuse by Revising Identity Management and User Account Data
Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders
Safe Authentication Protocol for Secure USB Memories
Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments
Towards Side-Effects-free Database Penetration Testing
Reliable Social Trust Management with Mitigating Sparsity Problem