Follow
Brian Lindauer
Brian Lindauer
Duo Security
Verified email at shendauer.com
Title
Cited by
Cited by
Year
Bridging the gap: A pragmatic approach to generating insider threat data
J Glasser, B Lindauer
2013 IEEE Security and Privacy Workshops, 98-104, 2013
2972013
Generating Test Data for Insider Threat Detectors.
B Lindauer, J Glasser, M Rosen, KC Wallnau, L ExactData
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5 (2), 80-94, 2014
462014
Insider threat test dataset
B Lindauer
Carnegie Mellon University Dataset, 2020
272020
Data mining for efficient collaborative information discovery
B Woods, SJ Perl, B Lindauer
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative …, 2015
182015
This malware looks familiar: Laymen identify malware run-time similarity with chernoff faces and stick figures
N VanHoudnos, W Casey, D French, B Lindauer, E Kanal, E Wright, ...
10th EAI International Conference on Bio-inspired Information and …, 2017
112017
Simulating Malicious Insiders in Real {Host-Monitored} User Data
K Wallnau, B Lindauer, M Theis, R Durst, T Champion, E Renouf, ...
7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014
62014
Human-Computer Decision Systems for Cybersecurity
N VanHoudnos, S Moon, D French, B Lindauer, P Jansen, J Carbonell, ...
2016
Deep Focus: Increasing User" Depth of Field" to Improve Threat Detection (Oxford Workshop Poster)
WR Claycomb, R Maxion, J Clark, B Woods, B Lindauer, D Jensen, J Neil, ...
2014
Egonetwork Properties and Successful Filmmaking
R Bandyopadhyay, R Guerrero-Platero, B Lindauer, A Goel, DHP Chau
The system can't perform the operation now. Try again later.
Articles 1–9