Insider threat identification by process analysis

M Bishop, HM Conboy, H Phan… - 2014 IEEE Security …, 2014 - ieeexplore.ieee.org
The insider threat is one of the most pernicious in computer security. Traditional approaches
typically instrument systems with decoys or intrusion detection mechanisms to detect …

Go with the flow: Toward workflow-oriented security assessment

B Chen, Z Kalbarczyk, DM Nicol, WH Sanders… - Proceedings of the …, 2013 - dl.acm.org
In this paper we advocate the use of workflow---describing how a system provides its
intended functionality---as a pillar of cybersecurity analysis and propose a holistic workflow …

Application of digits based test to analyse presidential election data in Nigeria

S Tunmibi, W Olatokun - Commonwealth & Comparative Politics, 2021 - Taylor & Francis
This study examined the application of Benford's Law to analyse the 2015 and 2019
presidential election data in Nigeria. Data obtained from the electoral body were analysed …

Insider attack identification and prevention using a declarative approach

A Sarkar, S Köhler, S Riddle… - 2014 IEEE Security …, 2014 - ieeexplore.ieee.org
A process is a collection of steps, carried out using data, by either human or automated
agents, to achieve a specific goal. The agents in our process are insiders, they have access …

[PDF][PDF] Applying a reusable election threat model at the county level

EL Lazarus, DL Dill, J Epstein - … on Trustworthy Elections (EVT/WOTE 11), 2011 - usenix.org
We describe the first systematic, quantitative threat evaluation in a local election jurisdiction
in the US, Marin County, California, in the November 2010 general election. We made use of …

A systematic process-model-based approach for synthesizing attacks and evaluating them

H Phan, G Avrunin, M Bishop, LA Clarke, LJ Osterweil - 2012 - usenix.org
This paper describes a systematic approach for incrementally improving the security of
election processes by using a model of the process to develop attack plans and then …

Exploring Process Performance of Envelope Opening and Ballot Extraction Options in Vote-by-Mail: A Utah Case Study

LS Otte, GA Macht - Proceedings of the Human Factors and …, 2024 - journals.sagepub.com
Vote-by-Mail (VBM) has become increasingly popular over the last decade, but the process
is executed differently even between jurisdictions within the same state. Currently, most VBM …

Iterative analysis to improve key properties of critical human-intensive processes: An election security example

LJ Osterweil, M Bishop, HM Conboy, H Phan… - ACM Transactions on …, 2017 - dl.acm.org
In this article, we present an approach for systematically improving complex processes,
especially those involving human agents, hardware devices, and software systems. We …

Voting by mail: a Markov chain model for managing the security risks of election systems

CA Haseltine, LA Albert - arxiv preprint arxiv:2410.13900, 2024 - arxiv.org
The scrutiny surrounding vote-by-mail (VBM) in the United States has increased in recent
years, raising concerns about the integrity and security of absentee voting. This paper …

Resource scheduling through resource-aware simulation of emergency departments

SY Shin, H Balasubramanian, Y Brun… - … in Health Care …, 2013 - ieeexplore.ieee.org
This paper proposes using resource-aware, discrete-event simulation to measure the effects
of resource scheduling in hospital emergency departments. Determining staffing and …