关注
Brian Lindauer
Brian Lindauer
Duo Security
在 shendauer.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Bridging the gap: A pragmatic approach to generating insider threat data
J Glasser, B Lindauer
2013 IEEE Security and Privacy Workshops, 98-104, 2013
3382013
Generating Test Data for Insider Threat Detectors.
B Lindauer, J Glasser, M Rosen, KC Wallnau, L ExactData
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5 (2), 80-94, 2014
512014
Insider threat test dataset
B Lindauer
Carnegie Mellon University Dataset, 2020
392020
Data mining for efficient collaborative information discovery
B Woods, SJ Perl, B Lindauer
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative …, 2015
192015
This malware looks familiar: Laymen identify malware run-time similarity with chernoff faces and stick figures
N VanHoudnos, W Casey, D French, B Lindauer, E Kanal, E Wright, ...
10th EAI International Conference on Bio-inspired Information and …, 2017
132017
Simulating Malicious Insiders in Real {Host-Monitored} User Data
K Wallnau, B Lindauer, M Theis, R Durst, T Champion, E Renouf, ...
7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014
62014
Deep Focus: Increasing User" Depth of Field" to Improve Threat Detection (Oxford workshop poster)
WR Claycomb
2014
Egonetwork Properties and Successful Filmmaking
R Bandyopadhyay, R Guerrero-Platero, B Lindauer, A Goel, DHP Chau
系统目前无法执行此操作,请稍后再试。
文章 1–8