A survey of insider attack detection research

MB Salem, S Hershkop, SJ Stolfo - … Attack and Cyber Security: Beyond the …, 2008 - Springer
This paper surveys proposed solutions for the problem of insider attack detection appearing
in the computer security research literature. We distinguish between masqueraders and …

On security research towards future mobile network generations

D Rupprecht, A Dabrowski, T Holz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …

[KİTAP][B] The cybersecurity dilemma: Hacking, trust, and fear between nations

B Buchanan - 2016 - books.google.com
Why do nations break into one another's most important computer networks? There is an
obvious answer: to steal valuable information or to attack. But this isn't the full story. This …

Identity and content authentication for phone calls

PG Traynor, BG Reaves, LE Blue, L Vargas… - US Patent …, 2020 - Google Patents
H04L 9/32(2006.01) H04W 12/04(2009.01) H04L 29/06(2006.01) H04W 12/06(2009.01)
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

Methods, systems, and media for baiting inside attackers

SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …

Methods, systems, and media for masquerade attack detection by monitoring computer user behavior

SJ Stolfo, MB Salem, S Hershkop - US Patent 8,769,684, 2014 - Google Patents
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …

SMS-Based One-Time Passwords: Attacks and Defense: (Short Paper)

C Mulliner, R Borgaonkar, P Stewin… - Detection of Intrusions and …, 2013 - Springer
Abstract SMS-based One-Time Passwords (SMS OTP) were introduced to counter phishing
and other attacks against Internet services such as online banking. Today, SMS OTPs are …

[PDF][PDF] Bugs in our pockets: The risks of client-side scanning

H Abelson, R Anderson, SM Bellovin… - Journal of …, 2024 - academic.oup.com
Our increasing reliance on digital technology for personal, economic, and government
affairs has made it essential to secure the communications and devices of private citizens …

Systems, methods, and media for generating bait information for trap-based defenses

AD Keromytis, SJ Stolfo - US Patent 8,819,825, 2014 - Google Patents
Systems, methods, and media for generating bait information for trap-based defenses are
provided. In some embodiments, methods for generating bait information for trap-based …