skip to main content
10.1145/2810103.2812622acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
abstract

MIST 2015: 7th International Workshop on Managing Insider Security Threats

Published: 12 October 2015 Publication History

Abstract

In this paper, we provide a brief summary of the 7th International Workshop on Managing Insider Security Threats (MIST 2015). MIST 2015 is held in conjunction with the 22nd ACM Conference on Computer and Communications Security (ACM CCS 2015). The workshop aims to showcase the most recent challenges and advanced technologies for managing insider security threats

References

[1]
Legg, P., Buckley, O., Goldsmith M., and Creese S., 2014. Visual analytics of E-mail sociolinguistics for user behavioural analysis. Journal of Internet Services and Information Security. 4, 4 (November 2014), 1--13
[2]
Huth, C. L., Chadwick, D. W., Claycomb, W. R., and You, I., 2o13. Guest editorial: A brief overview of data leakage and insider threats. Information Systems Frontiers. 15, 1 (Mar. 2013), 1--4.
[3]
Claycomb, W. R., Legg, P. A., and Gollmann, D., 2014. Guest editorial: Emerging trends in research for insider threat detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 5, 2 (June 2014), 1--6.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
October 2015
1750 pages
ISBN:9781450338325
DOI:10.1145/2810103
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2015

Check for updates

Author Tags

  1. cyber security and defense
  2. data leakage prevention
  3. insider threats

Qualifiers

  • Abstract

Conference

CCS'15
Sponsor:

Acceptance Rates

CCS '15 Paper Acceptance Rate 128 of 660 submissions, 19%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 307
    Total Downloads
  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media