Articles in journals or book chapters (2)
  1. P. Moriano, J. Pendleton, S. Rich, and L. J. Camp. Stopping the Insider at the Gates: Protecting Organizational Assets Through Graph Mining. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 9(1):4--29, 2018. [bibtex-entry]


  2. P. Moriano, S. Achar, and L. J. Camp. Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. Computers & Security, 70:319--334, 2017. [bibtex-entry]


Conference articles (4)
  1. P. Moriano, R. Hill, and L. J. Camp. Hijacking Network Traffic: Temporal Analysis of Adverse Changes in the Internet Topology. In Conference on Complex Systems, Thessaloniki, Greece, September 2018. [bibtex-entry]


  2. C. McElroy, P. Moriano, and L. J. Camp. Poster: On Predicting BGP Anomalous Incidents: A Bayesian Approach. In Network and Distributed System Security Symposium (NDSS), 2018. [bibtex-entry]


  3. P. Moriano, J. Pendleton, S. Rich, and L. J. Camp. Insider Threat Event Detection in User-System Interactions. In 9th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Dallas, TX, USA, pages 1--12, 2017. [bibtex-entry]


  4. P. Moriano, S. Achar, and L. Jean Camp. Poster: Macroeconomic Analysis of Routing Anomalies. In Conference on Communication, Information and Internet Policy (TPRC), Arlington, VA, USA, 2016. [bibtex-entry]



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Wed Dec 19 03:00:03 2018
Author: teamhats.


This document was translated from BibTEX by bibtex2html