Bridging the gap: A pragmatic approach to generating insider threat data J Glasser, B Lindauer 2013 IEEE Security and Privacy Workshops, 98-104, 2013 | 299 | 2013 |
Generating Test Data for Insider Threat Detectors. B Lindauer, J Glasser, M Rosen, KC Wallnau, L ExactData J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5 (2), 80-94, 2014 | 46 | 2014 |
Insider threat test dataset B Lindauer Carnegie Mellon University Dataset, 2020 | 28 | 2020 |
Data mining for efficient collaborative information discovery B Woods, SJ Perl, B Lindauer Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative …, 2015 | 18 | 2015 |
This malware looks familiar: Laymen identify malware run-time similarity with chernoff faces and stick figures N VanHoudnos, W Casey, D French, B Lindauer, E Kanal, E Wright, ... 10th EAI International Conference on Bio-inspired Information and …, 2017 | 11 | 2017 |
Simulating Malicious Insiders in Real {Host-Monitored} User Data K Wallnau, B Lindauer, M Theis, R Durst, T Champion, E Renouf, ... 7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014 | 6 | 2014 |
Human-Computer Decision Systems for Cybersecurity N VanHoudnos, S Moon, D French, B Lindauer, P Jansen, J Carbonell, ... | | 2016 |
Deep Focus: Increasing User" Depth of Field" to Improve Threat Detection (Oxford Workshop Poster) WR Claycomb, R Maxion, J Clark, B Woods, B Lindauer, D Jensen, J Neil, ... | | 2014 |
Egonetwork Properties and Successful Filmmaking R Bandyopadhyay, R Guerrero-Platero, B Lindauer, A Goel, DHP Chau | | |