" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Correct audit logging: Theory and practice
Retrospective security has become increasingly important to the theory and practice of cyber
security, with auditing a crucial component of it. However, in systems where auditing is used …
security, with auditing a crucial component of it. However, in systems where auditing is used …
On risk in access control enforcement
While we have long had principles describing how access control enforcement should be
implemented, such as the reference monitor concept, imprecision in access control …
implemented, such as the reference monitor concept, imprecision in access control …
Correct audit logging in concurrent systems
S Amir-Mohammadian, C Kari - Electronic Notes in Theoretical Computer …, 2020 - Elsevier
Audit logging provides post-facto analysis of runtime behavior for different purposes,
including error detection, amelioration of system operations, and the establishment of …
including error detection, amelioration of system operations, and the establishment of …
[CARTE][B] A formal approach to combining prospective and retrospective security
S Amir-Mohammadian - 2017 - search.proquest.com
The major goal of this dissertation is to enhance software security by provably correct
enforcement of in-depth policies. In-depth security policies allude to heterogeneous …
enforcement of in-depth policies. In-depth security policies allude to heterogeneous …
Co-engineering safety and security in risk-prone smart work environments
M Teimourikia - 2017 - politesi.polimi.it
Safety and security are two risk-driven aspects that are usually tackled separately. The
importance of considering safety and security as inter-dependent aspects is highlighted in …
importance of considering safety and security as inter-dependent aspects is highlighted in …
[PDF][PDF] Correct audit logging in concurrent systems (technical report)
S Amir-Mohammadiah, C Kari - 2020 - sepehram.github.io
Audit logging provides post-facto analysis of runtime behavior for different purposes,
including error detection, amelioration of system operations, and the establishment of …
including error detection, amelioration of system operations, and the establishment of …
[CARTE][B] Learning from access logs to mitigate insider threats
W Zhang - 2016 - search.proquest.com
The insider threat arises when an employee in an organization abuses their permissions to
harm the security of the organization's information system. The insider threat has be-come …
harm the security of the organization's information system. The insider threat has be-come …
[PDF][PDF] The theory and practice of correct audit logging
Auditing has become increasingly important to the theory and practice of cyber security.
However, in systems where auditing is used, programs are typically instrumented to …
However, in systems where auditing is used, programs are typically instrumented to …
Mining the Best Observational Window to Model Social Phenomena
The structure and behavior of organizations can be learned by mining the event logs of the
information systems they manage. This supports numerous applications, such as inferring …
information systems they manage. This supports numerous applications, such as inferring …