Bridging the gap: A pragmatic approach to generating insider threat data J Glasser, B Lindauer 2013 IEEE Security and Privacy Workshops, 98-104, 2013 | 338 | 2013 |
Generating Test Data for Insider Threat Detectors. B Lindauer, J Glasser, M Rosen, KC Wallnau, L ExactData J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5 (2), 80-94, 2014 | 51 | 2014 |
Insider threat test dataset B Lindauer Carnegie Mellon University Dataset, 2020 | 39 | 2020 |
Data mining for efficient collaborative information discovery B Woods, SJ Perl, B Lindauer Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative …, 2015 | 19 | 2015 |
This malware looks familiar: Laymen identify malware run-time similarity with chernoff faces and stick figures N VanHoudnos, W Casey, D French, B Lindauer, E Kanal, E Wright, ... 10th EAI International Conference on Bio-inspired Information and …, 2017 | 13 | 2017 |
Simulating Malicious Insiders in Real {Host-Monitored} User Data K Wallnau, B Lindauer, M Theis, R Durst, T Champion, E Renouf, ... 7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014 | 6 | 2014 |
Deep Focus: Increasing User" Depth of Field" to Improve Threat Detection (Oxford workshop poster) WR Claycomb | | 2014 |
Egonetwork Properties and Successful Filmmaking R Bandyopadhyay, R Guerrero-Platero, B Lindauer, A Goel, DHP Chau | | |