Insider attack and cyber security: beyond the hacker SJ Stolfo, SM Bellovin, S Hershkop, AD Keromytis, S Sinclair, SW Smith Springer Science & Business Media, 2008 | 120 | 2008 |
Preventative directions for insider threat mitigation via access control S Sinclair, SW Smith Insider attack and cyber security: Beyond the hacker, 165-194, 2008 | 58 | 2008 |
Information risk in financial institutions: Field study and research roadmap S Sinclair, SW Smith, S Trudeau, ME Johnson, A Portera International Workshop on Enterprise Applications and Services in the …, 2007 | 43 | 2007 |
What's wrong with access control in the real world? S Sinclair, SW Smith IEEE Security & Privacy 8 (4), 74-77, 2010 | 38 | 2010 |
An experience report on undergraduate cyber-security education and outreach M Locasto, S Sinclair Annual Conference on Education in Information Security (ACEIS), 2009 | 27 | 2009 |
The effects of introspection on creating privacy policy S Trudeau, S Sinclair, SW Smith Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, 1-10, 2009 | 15 | 2009 |
PorKI: Making user PKI safe on machines of heterogeneous trustworthiness S Sinclair, SW Smith 21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-430, 2005 | 12 | 2005 |
Access control in and for the real world S Sinclair Dartmouth College, 2014 | 11 | 2014 |
The TIPPI point: Toward trustworthy interfaces S Sinclair, SW Smith IEEE security & privacy 3 (4), 68-71, 2005 | 11 | 2005 |
PorKI: Portable PKI credentials via proxy certificates M Pala, S Sinclair, SW Smith European Public Key Infrastructure Workshop, 1-16, 2010 | 10 | 2010 |
Attacking and Defending Networked Embedded Devices KH Baek, S Bratus, S Sinclair, SW Smith 2nd Workshop on Embedded Systems Security (WESS)(Salzburg, Austria, 2007 | 10 | 2007 |
Adapting bayesian statistical spam filters to the server side S Sinclair Journal of Computing Sciences in Colleges 19 (5), 344-346, 2004 | 10 | 2004 |
Expressing trust in distributed systems: the mismatch between tools and reality SW Smith, C Masone, S Sinclair Forty-Second Annual Allerton Conference on Privacy, Security and Trust, 29-39, 2004 | 9 | 2004 |
Information risk in the professional services–field study results from financial institutions and a roadmap for research S Sinclair, SW Smith, S Trudeau, ME Johnson, A Portera Proceedings for the 3rd International Workshop on Enterprise Applications …, 2007 | 8 | 2007 |
Insider attack and cyber security, advances in information security SJ Stolfo, S Bellovin, S Hershkop, A Keromytis, S Sinclair, S Smith Springer, 2008 | 7 | 2008 |
Access control realities as observed in a clinical medical setting S Sinclair, S Smith | 4 | 2012 |
Protecting Data Privacy With User-Friendly Software SS Brody Council On Foreign Relations Cyber Brief Series, 2016 | 3 | 2016 |
Advances in information security: Insider attack and cyber security-Beyond the hacker SJ Stolfo, SM Bellovin, S Hershkop, AD Keromytis, S Sinclair, SW Smith Springer, New York, 2008 | 3 | 2008 |
Dumbots: Unexpected botnets through networked embedded devices KH Baek, S Bratus, S Sinclair | 3 | 2007 |
Meta-observations from an outsider's study of clinical environments S Sinclair Proceedings of the first ACM workshop on Security and privacy in medical and …, 2009 | | 2009 |