Genie in a Model? Why Model Driven Security will not secure your Web ApplicationA Model-Driven Approach to NoninterferenceEvaluation of Computer Network Security based on Attack Graphs and Security Event ProcessingEfficient variant of Rainbow using sparse secret keysEditorialGenerating Test Data for Insider Threat DetectorsInvalidating Policies using Structural InformationMulti-source fusion for anomaly detection: using across-domain and across-time peer-group consistency checksDifferentiating User Authentication GraphsInsider Threat Defined: Discovering the Prototypical Case