Christian Payne

According to our database1, Christian Payne authored at least 19 papers between 2000 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Anomaly Detection in Operating System Logs with Deep Learning-Based Sentiment Analysis.
IEEE Trans. Dependable Secur. Comput., 2021

2020
Sentiment Analysis in a Forensic Timeline With Deep Learning.
IEEE Access, 2020

Automatic Event Log Abstraction to Support Forensic Investigation.
Proceedings of the Australasian Computer Science Week, 2020

2019
A survey on forensic investigation of operating system logs.
Digit. Investig., 2019

Automatic Graph-Based Clustering for Security Logs.
Proceedings of the Advanced Information Networking and Applications, 2019

2017
Graph clustering and anomaly detection of access control log for forensic purposes.
Digit. Investig., 2017

2013
The functionality-based application confinement model.
Int. J. Inf. Sec., 2013

The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls.
Comput. Secur., 2013

2012
Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM.
Int. J. Inf. Secur. Priv., 2012

2011
Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM.
ACM Trans. Inf. Syst. Secur., 2011

A Policy Language for Abstraction and Automation in Application-Oriented Access Controls: The Functionality-Based Application Confinement Policy Language.
Proceedings of the POLICY 2011, 2011

Techniques for Automating Policy Specification for Application-oriented Access Controls.
Proceedings of the Sixth International Conference on Availability, 2011

2008
Functionality-based Application Confinement - Parameterised Hierarchical Application Restrictions.
Proceedings of the SECRYPT 2008, 2008

Reusability of Functionality-Based Application Confinement Policy Abstractions.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

2007
An Improved Model for Secure Cryptographic Integrity Verification of Local Code.
Proceedings of the SECRYPT 2007, 2007

A cryptographic access control architecture secure against privileged attackers.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

2004
Enhanced Security Models for Operating Systems: A Cryptographic Approach.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2002
On the security of open source software.
Inf. Syst. J., 2002

2000
The Role of the Development Process in Operating System Security.
Proceedings of the Information Security, Third International Workshop, 2000


  Loading...