Workshop on Research for Insider Threat (WRIT) 2013: Program

horse-WRIT WRIT 2013

The Westin Hotel  |  San Francisco, CA USA  |  Friday, May 24, 2013

Session 1  |  Session 2  |  Session 3  Session 4


9:00 - 10:10
Session 1:  Keynote Speaker: Bob Hutchinson

10:10 - 10:40
Coffee Break

10:40 - 12:15
Session 2:  Detection at the Host

Multi-Domain Information Fusion for Insider Threat Detection
Hoda Eldardiry, Evgeniy Bart, Juan Liu, John Hanley, Bob Price, and Oliver Brdiczka

System Level User Behavior Biometrics Using Fisher Features and Gaussian Mixture Models
Yingbo Song, Malek Ben Salem, Shlomo Hershkop, and Salvatore Stolfo

Use of Domain Knowledge to Detect Insider Threats in Computer Activities
William Young, Henry Goldberg, Alex Memory, James Sartain, and Ted Senator

12:15 - 1:30

1:30 - 3:15
Session 3:  Network and Policy

Reporting Insider Threats via Covert Channels
David Muchene, Klevis Luli, and Craig Shue

Differentiating User Authentication Graphs
Alexander Kent and Lorie Liebrock

Invalidating Policies using Structural Information
Florian Kammueller and Christian W. Probst

3:15 - 3:45
Coffee Break

3:45 - 5:00
Session 4:  Behavioral Science and Data

Bayesian Network Model for Predicting Insider Threats
Elise Axelrad, Paul Sticha, Oliver Brdiczka, and Jianqiang Shen

Methods and Metrics for Evaluating Analytic Insider Threat Tools
Frank Greitzer and Thomas Ferryman

Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data
Brian Lindauer and Joshua Glasser

Contact Information

Dr. William (Bill) Claycomb
Carnegie Mellon University


IBM         Microsoft Research        Raytheon

Microsoft        Cisco

Indiana University Logo

Site hosting by the SEI