Simon N. Foley
Orcid: 0000-0002-0183-1215Affiliations:
- University College Cork, Ireland
According to our database1,
Simon N. Foley
authored at least 127 papers
between 1987 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on cs.ucc.ie
-
on dl.acm.org
On csauthors.net:
Bibliography
2022
Proceedings of the Critical Information Infrastructures Security, 2022
2021
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.
Proceedings of the Emerging Information Security and Applications, 2021
2020
Quantitatively Measuring Privacy in Interactive Query Settings Within RDBMS Framework.
Frontiers Big Data, 2020
Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.
CoRR, 2020
Towards Privacy-anomaly Detection: Discovering Correlation between Privacy and Security-anomalies.
Proceedings of the 17th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2020) / The 15th International Conference on Future Networks and Communications (FNC-2020) / The 10th International Conference on Sustainable Energy Information Technology, 2020
2019
Proceedings of the Security Protocols XXVII, 2019
Social Constructionism in Security Protocols - A Position on Human Experience, Psychology and Security.
Proceedings of the Security Protocols XXVII, 2019
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
2018
Journal of Computer Security, January, 2018
An Online Consent Maturity Model: Moving from Acceptable Use Towards Ethical Practice.
Proceedings of the New Security Paradigms Workshop, 2018
What You Can Change and What You Can't: Human Experience in Computer Network Defenses.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018
Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System (Transcript of Discussion).
Proceedings of the Security Protocols XXV, 2017
Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System.
Proceedings of the Security Protocols XXV, 2017
Proceedings of the 2017 New Security Paradigms Workshop, 2017
On database intrusion detection: A Query analytics-based model of normative behavior to detect insider attacks.
Proceedings of the 7th International Conference on Communication and Network Security, 2017
What Users Want: Adapting Qualitative Research Methods to Security Policy Elicitation.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management Systems.
Proceedings of the Risks and Security of Internet and Systems, 2017
2016
The Evolution of a Security Control or Why Do We Need More Qualitative Research of Software Vulnerabilties? (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Security Protocols XXIV, 2016
Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems.
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Proceedings of the Security Protocols XXII, 2014
Collaborating as Normal: Detecting Systemic Anomalies in Your Partner (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014
2013
J. Inf. Secur. Appl., 2013
Int. J. Intell. Syst., 2013
Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
Proceedings of the 25th IEEE International Conference on Tools with Artificial Intelligence, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
2011
J. Comput. Secur., 2011
Inf. Sci., 2011
Comput. Stand. Interfaces, 2011
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011
2010
Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria.
Secur. Commun. Networks, 2010
Multidomain IT architectures for next-generation communications service providers [Next-Generation Telco IT Architectures].
IEEE Commun. Mag., 2010
Proceedings of the Security and Trust Management - 6th International Workshop, 2010
Management of heterogeneous security access control configuration using an ontology engineering approach.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010
Proceedings of the 6th International Conference on Network and Service Management, 2010
Virtual environment for the navigation of ideas and concepts in education (V.E.N.I.C.E).
Proceedings of the International Conference on Advanced Visual Interfaces, 2010
2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Data and Applications Security XXIII, 2009
2008
Network Access Control Interoperation using Semantic Web Techniques.
Proceedings of the Security in Information Systems, 2008
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008
Proceedings of the Recent Advances in Constraints, 2008
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
J. High Speed Networks, 2006
J. High Speed Networks, 2006
Int. J. High Perform. Comput. Appl., 2006
Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration.
Proceedings of the Autonomic Principles of IP Operations and Management, 2006
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
2005
J. Comput. Secur., 2005
Proceedings of the First International Workshop on Security and Trust Management, 2005
Proceedings of the Security Protocols, 2005
Proceedings of the Security Protocols, 2005
Cross Cutting Condensed Graphs.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005
Proceedings of the Intelligence in Communication Systems, 2005
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005
Proceedings of the Data and Applications Security XIX, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the New Security Paradigms Workshop 2004, 2004
Proceedings of the 3rd International Symposium on Parallel and Distributed Computing (ISPDC 2004), 2004
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints.
Proceedings of the Nineteenth National Conference on Artificial Intelligence, 2004
2003
Proceedings of the Security Protocols, 2003
Proceedings of the Security Protocols, 2003
A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity.
Proceedings of the Computer Safety, 2003
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003
Proceedings of the Financial Cryptography, 2003
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003
2002
Proceedings of the Security Protocols, 2002
Secure Component Distribution Using WebCom.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
2001
Proceedings of the Security Protocols, 2001
Proceedings of the Security Protocols, 2001
Proceedings of the New Security Paradigms Workshop 2001, 2001
2000
Proceedings of the 2000 Workshop on New Security Paradigms, 2000
1998
External Consistency and the Verification of Security Protocols (Transcript of Discussion).
Proceedings of the Security Protocols, 1998
Proceedings of the Security Protocols, 1998
Proceedings of the 1998 Workshop on New Security Paradigms, 1998
Proceedings of the Computer Security, 1998
1997
The Specification and Implementation of "Commercial" Security Requirements Including Dynamic Segregation of Duties.
Proceedings of the CCS '97, 1997
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
1995
J. Comput. Secur., 1995
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
1994
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994
1992
1991
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
1990
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990
1989
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989
1987
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987