Carrie Gates

According to our database1, Carrie Gates authored at least 38 papers between 2000 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Augmenting Machine Learning with Argumentation.
Proceedings of the New Security Paradigms Workshop, 2018

2014
Data Is the New Currency.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

2013
Forgive and forget: return to obscurity.
Proceedings of the New Security Paradigms Workshop, 2013

Information behaving badly.
Proceedings of the New Security Paradigms Workshop, 2013

Reflecting on visualization for cyber security.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Stability Visualizations as a Low-complexity Descriptor of Network Host Behaviour.
Proceedings of the 4th International Conference on Ambient Systems, 2013

2012
Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501).
Dagstuhl Reports, 2012

2011
One of These Records Is Not Like the Others.
Proceedings of the 3rd Workshop on the Theory and Practice of Provenance, 2011

Do you know dis?: a user study of a knowledge discovery tool for organizations.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
A Risk Management Approach to the "Insider Threat".
Proceedings of the Insider Threats in Cyber Security, 2010

Watching the watchers: "voluntary monitoring" of infosec employees.
Inf. Manag. Comput. Secur., 2010

The security and privacy implications of using social networks to deliver healthcare.
Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, 2010

2009
Over flow: An overview visualization for network analysis.
Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009

The sisterhood of the traveling packets.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009

Coordinated Scan Detection.
Proceedings of the Network and Distributed System Security Symposium, 2009

Case Studies of an Insider Framework.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Watchdog or Guardian? Unpacking the Issues Surrounding the Monitoring of InfoSec Employees.
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009

2008
A case study in testing a network security algorithm.
Proceedings of the 4th International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2008), 2008

We have met the enemy and he is us.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors.
Proceedings of the Detection of Intrusions and Malware, 2008

Defining the insider threat.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

An access control reference architecture.
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008

2007
A Psychological Profile of Defender Personality Traits.
J. Comput., 2007

<i>SWorD</i> - A Simple Worm Detection Scheme.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

2006
Defender Personality Traits.
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006

A Model for Opportunistic Network Exploits: The Case of P2P Worms.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

Challenging the anomaly detection paradigm: a provocative discussion.
Proceedings of the New Security Paradigms Workshop 2006, 2006

NAF: The NetSA Aggregated Flow Tool Suite.
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006

Scan Detection on Very Large Networks Using Logistic Regression Modeling.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

DJs' perspectives on interaction and awareness in nightclubs.
Proceedings of the Conference on Designing Interactive Systems, 2006

2004
Profiling the defenders.
Proceedings of the New Security Paradigms Workshop 2004, 2004

More Netflow Tools for Performance and Security.
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004

2003
Locality: a new paradigm for thinking about normal behavior and outsider threat.
Proceedings of the New Security Paradigms Workshop 2003, 2003

Owner-controlled information.
Proceedings of the New Security Paradigms Workshop 2003, 2003

The Yearly Review, or How to Evaluate Your Sys Admin.
Proceedings of the 17th Conference on Systems Administration (LISA 2003), 2003

2001
An Extensible, Human-Centric Framework That Promotes Universal Access to Electronic Commerce.
Proceedings of the Topics in Electronic Commerce, Second International Symposium, 2001

2000
Electronic commerce universal access device-the knowledge-acquiring layered infrastructure (KALI) project.
XRDS, 2000

Creating an Electronic Commerce Device Which Promotes Universal Access: The KALI Project.
Proceedings of the Distributed Communities on the Web, Third International Workshop, 2000


  Loading...