" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Correct audit logging: Theory and practice

S Amir-Mohammadian, S Chong, C Skalka - International Conference on …, 2016 - Springer
Retrospective security has become increasingly important to the theory and practice of cyber
security, with auditing a crucial component of it. However, in systems where auditing is used …

On risk in access control enforcement

G Petracca, F Capobianco, C Skalka… - Proceedings of the 22nd …, 2017 - dl.acm.org
While we have long had principles describing how access control enforcement should be
implemented, such as the reference monitor concept, imprecision in access control …

Correct audit logging in concurrent systems

S Amir-Mohammadian, C Kari - Electronic Notes in Theoretical Computer …, 2020 - Elsevier
Audit logging provides post-facto analysis of runtime behavior for different purposes,
including error detection, amelioration of system operations, and the establishment of …

[CARTE][B] A formal approach to combining prospective and retrospective security

S Amir-Mohammadian - 2017 - search.proquest.com
The major goal of this dissertation is to enhance software security by provably correct
enforcement of in-depth policies. In-depth security policies allude to heterogeneous …

Co-engineering safety and security in risk-prone smart work environments

M Teimourikia - 2017 - politesi.polimi.it
Safety and security are two risk-driven aspects that are usually tackled separately. The
importance of considering safety and security as inter-dependent aspects is highlighted in …

[PDF][PDF] Correct audit logging in concurrent systems (technical report)

S Amir-Mohammadiah, C Kari - 2020 - sepehram.github.io
Audit logging provides post-facto analysis of runtime behavior for different purposes,
including error detection, amelioration of system operations, and the establishment of …

[CARTE][B] Learning from access logs to mitigate insider threats

W Zhang - 2016 - search.proquest.com
The insider threat arises when an employee in an organization abuses their permissions to
harm the security of the organization's information system. The insider threat has be-come …

[PDF][PDF] The theory and practice of correct audit logging

S Amir-Mohammadian, S Chong, C Skalka - 2015 - sepehram.github.io
Auditing has become increasingly important to the theory and practice of cyber security.
However, in systems where auditing is used, programs are typically instrumented to …

Mining the Best Observational Window to Model Social Phenomena

C Yan, Z Yin, S **ang, Y Chen… - 2018 IEEE 4th …, 2018 - ieeexplore.ieee.org
The structure and behavior of organizations can be learned by mining the event logs of the
information systems they manage. This supports numerous applications, such as inferring …