Malek Ben Salem
Affiliations:- Accenture Technology Labs, USA
 - Allure Security Technology Inc., USA
 - Columbia University, USA (PhD 2012)
 
  According to our database1,
  Malek Ben Salem
  authored at least 16 papers
  between 2008 and 2019.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2019
Active authentication using file system decoys and user behavior modeling: results of a large scale study.
    
  
    Comput. Secur., 2019
    
  
  2018
    Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018
    
  
  2016
You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage.
    
  
    Proceedings of the 8th EAI International Conference on Mobile Computing, 2016
    
  
  2013
System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models.
    
  
    Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013
    
  
  2012
A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection.
    
  
    Secur. Commun. Networks, 2012
    
  
    J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
    
  
    Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
    
  
  2011
    Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
    
  
On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned.
    
  
    Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011
    
  
    Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
    
  
    Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
    
  
  2010
    Proceedings of the Insider Threats in Cyber Security, 2010
    
  
Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques.
    
  
    J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
    
  
  2009
    IEEE Secur. Priv., 2009
    
  
  2008
    Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008