Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Insider threat identification by process analysis
M Bishop, HM Conboy, H Phan… - 2014 IEEE Security …, 2014 - ieeexplore.ieee.org
The insider threat is one of the most pernicious in computer security. Traditional approaches
typically instrument systems with decoys or intrusion detection mechanisms to detect …
typically instrument systems with decoys or intrusion detection mechanisms to detect …
Go with the flow: Toward workflow-oriented security assessment
In this paper we advocate the use of workflow---describing how a system provides its
intended functionality---as a pillar of cybersecurity analysis and propose a holistic workflow …
intended functionality---as a pillar of cybersecurity analysis and propose a holistic workflow …
Application of digits based test to analyse presidential election data in Nigeria
This study examined the application of Benford's Law to analyse the 2015 and 2019
presidential election data in Nigeria. Data obtained from the electoral body were analysed …
presidential election data in Nigeria. Data obtained from the electoral body were analysed …
Insider attack identification and prevention using a declarative approach
A process is a collection of steps, carried out using data, by either human or automated
agents, to achieve a specific goal. The agents in our process are insiders, they have access …
agents, to achieve a specific goal. The agents in our process are insiders, they have access …
[PDF][PDF] Applying a reusable election threat model at the county level
We describe the first systematic, quantitative threat evaluation in a local election jurisdiction
in the US, Marin County, California, in the November 2010 general election. We made use of …
in the US, Marin County, California, in the November 2010 general election. We made use of …
A systematic process-model-based approach for synthesizing attacks and evaluating them
This paper describes a systematic approach for incrementally improving the security of
election processes by using a model of the process to develop attack plans and then …
election processes by using a model of the process to develop attack plans and then …
Exploring Process Performance of Envelope Opening and Ballot Extraction Options in Vote-by-Mail: A Utah Case Study
LS Otte, GA Macht - Proceedings of the Human Factors and …, 2024 - journals.sagepub.com
Vote-by-Mail (VBM) has become increasingly popular over the last decade, but the process
is executed differently even between jurisdictions within the same state. Currently, most VBM …
is executed differently even between jurisdictions within the same state. Currently, most VBM …
Iterative analysis to improve key properties of critical human-intensive processes: An election security example
In this article, we present an approach for systematically improving complex processes,
especially those involving human agents, hardware devices, and software systems. We …
especially those involving human agents, hardware devices, and software systems. We …
Voting by mail: a Markov chain model for managing the security risks of election systems
The scrutiny surrounding vote-by-mail (VBM) in the United States has increased in recent
years, raising concerns about the integrity and security of absentee voting. This paper …
years, raising concerns about the integrity and security of absentee voting. This paper …
Resource scheduling through resource-aware simulation of emergency departments
This paper proposes using resource-aware, discrete-event simulation to measure the effects
of resource scheduling in hospital emergency departments. Determining staffing and …
of resource scheduling in hospital emergency departments. Determining staffing and …