Articles in journals or book chapters (7)
  1. P. Moriano, J. Pendleton, S. Rich, and L. J. Camp. Stopping the Insider at the Gates: Protecting Organizational Assets Through Graph Mining. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 9(1):4--29, 2018. [bibtex-entry]


  2. Pablo Moriano, Soumya Achar, and L. Jean Camp. Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. Computers & Security, 70:319--334, 2017. [bibtex-entry]


  3. P. Moriano, S. Achar, and L. J. Camp. Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. Computers & Security, 70:319--334, 2017. [bibtex-entry]


  4. Prashanth Rajivan, Pablo Moriano, Timothy Kelley, and L. Jean Camp. Factors in an end user security expertise instrument. Information & Computer Security, 25(2):190--205, 2017. [bibtex-entry]


  5. Pablo Moriano, Soumya Achar, and L. Jean Camp. Macroeconomic Analysis of Routing Anomalies. Available at SSRN 2755699, 2016. [bibtex-entry]


  6. Clint McElroy, Pablo Moriano, and L. Jean Camp. Poster: On Predicting BGP Anomalous Incidents: A Bayesian Approach. . [bibtex-entry]


  7. Pablo Moriano, Jared Pendleton, Steven Rich, and L. Jean Camp. Stopping the Insider at the Gates: Protecting Organizational Assets Through Graph Mining. . [bibtex-entry]


Conference articles (6)
  1. P. Moriano, R. Hill, and L. J. Camp. Hijacking Network Traffic: Temporal Analysis of Adverse Changes in the Internet Topology. In Conference on Complex Systems, Thessaloniki, Greece, September 2018. [bibtex-entry]


  2. C. McElroy, P. Moriano, and L. J. Camp. Poster: On Predicting BGP Anomalous Incidents: A Bayesian Approach. In Network and Distributed System Security Symposium (NDSS), 2018. [bibtex-entry]


  3. Pablo Moriano, Jared Pendleton, Steven Rich, and L. Jean Camp. Insider Threat Event Detection in User-System Interactions. In Proceedings of the 2017 International Workshop on Managing Insider Security Threats, pages 1--12, 2017. ACM. [bibtex-entry]


  4. P. Moriano, J. Pendleton, S. Rich, and L. J. Camp. Insider Threat Event Detection in User-System Interactions. In 9th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Dallas, TX, USA, pages 1--12, 2017. [bibtex-entry]


  5. P. Moriano, S. Achar, and L. Jean Camp. Poster: Macroeconomic Analysis of Routing Anomalies. In Conference on Communication, Information and Internet Policy (TPRC), Arlington, VA, USA, 2016. [bibtex-entry]


  6. Prashanth Rajivan, Pablo Moriano, Timothy Kelley, and L. Jean Camp. What Can Johnny Do?--Factors in an End-User Expertise Instrument.. In HAISA, pages 199--208, 2016. [bibtex-entry]


Internal reports (1)
  1. Pablo Moriano, Srivatsan Iyer, and L. Jean Camp. Characterization of internet routing anomalies through graph mining. Technical report, Technical Report, Indiana 4 University, School of Informatics, Computing …, 2017. [bibtex-entry]



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Jan 21 23:00:02 2019
Author: teamhats.


This document was translated from BibTEX by bibtex2html