Malek Ben Salem

Affiliations:
  • Accenture Technology Labs, USA
  • Allure Security Technology Inc., USA
  • Columbia University, USA (PhD 2012)


According to our database1, Malek Ben Salem authored at least 16 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Active authentication using file system decoys and user behavior modeling: results of a large scale study.
Comput. Secur., 2019

2018
Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

2016
You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016

2013
System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

2012
Towards Effective Masquerade Attack Detection.
PhD thesis, 2012

A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection.
Secur. Commun. Networks, 2012

Combining Baiting and User Search Profiling Techniques for Masquerade Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

2011
Insider Threat Defense.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Modeling User Search Behavior for Masquerade Detection.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Decoy Document Deployment for Effective Masquerade Attack Detection.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

2010
Monitoring Technologies for Mitigating Insider Threats.
Proceedings of the Insider Threats in Cyber Security, 2010

Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

2009
Designing Host and Network Sensors to Mitigate the Insider Threat.
IEEE Secur. Priv., 2009

2008
A Survey of Insider Attack Detection Research.
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008


  Loading...