DR. CARRIE E. GATES
carrie.gates@gmail.com
http://www.cs.dal.ca/~gates
Publications
- M. Bishop, C. Gates and K. Levitt (2018). Arguing for Argumentation in
Break the Glass Scenarios. In Proceedings of the 2018 New Security
Paradigms Workshop. Windsor, UK. 28-31 August 2018. (To Appear)
- E. Stobert, R. Biddle and C. Gates (2016). Mobile Device Security: Hopes
and Fears. In Passwords 2016. Bochum, Germany. 5-7 December 2016
- C. Gates and P. Matthews (2014). Data is the New Currency. In
Proceedings of the 2014 New Security Paradigms Workshop. Victoria, Canada.
15-18 September 2014.
- C. Gates and P. Matthews (2013). The Internet of Things, CA
Technology Exchange 4:3, November 2013.
- M. Bishop, K. Butler, C. Gates, S. Greenspan and E. Rine Butler
(2013) Forgive and Forget: Return to Obscurity. In Proceedings of the 2013
New Security Paradigms Workshop. Banff, Canada. 9-12 September 2013.
- J. Ard, M. Bishop, C. Gates and M.X. Sun (2013) Information
Behaving Badly. In Proceedings of the 2013 New Security Paradigms
Workshop. Banff, Canada. 9-12 September 2013.
- M. MacDonald, C. Gates, T. Taylor, D. Paterson and S. Brooks
(2013). Stability Visualizations as a Low-complexity Descriptor of Network
Host Behaviour. Procedia Computer Science. 19: 984-991.
- C. Gates and S. Engle (2013) Reflecting on Visualization for
Cyber Security. In Proceedings of the 2013 IEEE International Conference
on Intelligence and Security Informatics (ISI). Seattle, WA. 4-7 June
2013.
- Y. Li, A. Somayaji and C. Gates (2013) Fine Grained Access
Control Using Email Social Networks. CA Technology Exchange.
4(1): 29-41. January 2013.
- M. Bishop, M. Doroud, C. Gates and J. Hunker (2012) Attribution
in the Future Internet: The Second Summer of the Sisterhood. In Proceedings
of the 11th European Conference on Information Warfare and Security.
Laval, France. 5-6 July, 2012.
- M. Bishop, C. Gates, P. Yellowlees and G. Silberman (2011)
Facebook Goes to the Doctor. In Proceedings of the 2011 Workshop on
Governance of Technology, Information, and Policies. Orlando, FL.,
December 6, 2011.
- J. Hunker, C. Gates and M. Bishop (2011) Attribution Requirements
for Next Generation Internets. In Proceedings of the 2011 IEEE
International Conference on Technologies for Homeland Security. Waltham,
MA. November 15-17, 2011.
- C. Gates and M. Bishop (2011) One of These Records Is Not Like the Other.
In Proceedings of the 3rd Usenix Workshop on the Theory and Practice of
Provenance. Crete, Greece. June 20-21, 2011.
- S. Laqua, M.A. Sasse, C. Gates, and S. Greenspan (2011) Do you
KnowDis? A User Study of Knowledge Discovery Tool for Organizations. In
Proceedings of the 2011 ACM CHI Conference on Human Factors in Computing
Systems. Vancouver, Canada. May 7-12, 2011.
- J. Glanfield, D. Paterson, C. Smith, T. Taylor, S. Brooks,
C. Gates, and J. McHugh (2010) FloVis: Leveraging Visualization to Protect
Sensitive Network Infrastructure. In Proceedings of the NATO Information
Systems Technology Panel Symposium on Information Assurance and Cyber
Defense. Tallinn, Estonia. November 22-23, 2010.
- S.Brunza, O. McCusker, J. Glanfield, D. Paterson, C. Gates, and J. McHugh
(2010) Combining Trust and Behavioral Analysis to Detect Security Threats.
In Proceedings of the NATO Information Systems Technology Panel Symposium
on Information Assurance and Cyber Defense. Tallinn, Estonia. November
22-23, 2010.
- M. Bishop, S. Engle, D. Frincke, C. Gates, F. Greitzer, S. Peisert, and
S. Whalen (2010) A Risk Management Approach to the "Insider Threat". To
appear in Insider Threats in Cybersecurity — And Beyond. Springer
Verlag, Berlin, DE.
- C. Gates and M. Bishop (2010) The Security and Privacy Implications of
Using Social Networks to Deliver Healthcare. In Proceedings of the 3rd
ACM International Conferenc on Pervasive Technologies Related to Assistive
Environments (PETRA). Samos, Greece. June 23-25, 2010.
- J. Glanfield, D. Paterson, C. Smith, T. Taylor, S. Brooks, C. Gates, and
J. McHugh (2010) FloVis: Leveraging Visualization to Protect Sensitive
Network Infrastructure. Accepted to the NATO Information Systems Technology
Panel Symposium on Information Assurance and Cyber Defense. Antalya, Turkey.
April 26-27, 2010.
- S.Brunza, O. McCusker, J. Glanfield, D. Paterson, C. Gates, and J. McHugh
(2010) Combining Trust and Behavioral Analysis to Detect Security Threats.
Accepted to the NATO Information Systems Technology Panel Symposium on
Information Assurance and Cyber Defense. Antalya, Turkey. April 26-27, 2010.
- T. Whalen and C. Gates (2010) Watching the watchers: "voluntary
monitoring" of Infosec employees. Information Management and Computer
Security. Vol. 18. No. 1.
- E. Hadar and C. Gates (2009) Cloud Computing Web-Services Offering and
IT Management Aspects. Accepted to the Cloud Computing Workshop at the
International Conference on Object Oriented Programming, Systems, Languages
and Applications OOPSLA 2009. Orlando, FL. October 25, 2009.
- J. Glanfield, S. Brooks, T. Taylor, D. Paterson, C Smith, C. Gates,
J. McHugh (2009) OverFlow: An Overview Visualization for Network Analysis.
Accepted to the 6th International Workshop on Visualization for Cyber
Security. Atlantic City, NJ. October 11, 2009.
- M. Bishop, C. Gates and J. Hunker (2009) Sisterhood of the Travelling
Packets. Accepted to the 2009 New Security Paradigms Workshop. Oxford, UK.
September 8-11, 2009.
- T. Whalen and C. Gates (2009) Watchdog or Guardian? Unpacking the Issues
Surrounding the Monitoring of InfoSec Employees. In Proceedings of the
2009 International Symposium on Human Aspects of Information Security &
Assurance. Athens, Greece. June 25-26, 2009.
- M. Bishop, D. Frincke, C. Gates and F. Greitzer (2009) AZALIA: and A to Z
Assesment of the Likelihood of Insider Attack. In Proceedings of the 2009
IEEE International Conference on Technologies for Homeland Security.
Waltham, MA. May 11-12, 2009. (pdf)
(Note: © 2009 IEEE. Personal use of this material is permitted. However,
permission to reprint/republish this material for advertising or promotional
purposes or for creating new collective works for resale or redistribution to
servers or lists, or to reuse any copyrighted component of this work in other
works must be obtained from the IEEE.)
- S. Laqua, A. Sasse, C. Gates and S. Greenspan (2009) Making Sense of the
Unknown: Knowledge Dissemination in Organizations. In the 2nd Sensemaking
Workshop. Boston, MA. April 4-5, 2009.
(pdf)
- T. Taylor, D. Paterson, J. Glanfield, C. Gates, S. Brooks, J. McHugh
(2009) FloVis: Flow Visualization System. In Proceedings of the
Cybersecurity Applications and Technologies Conference for Homeland Security
(CATCH). Washington, DC. March 3-4, 2009.
(pdf)
(Note: © 2009 IEEE. Personal use of this material is permitted. However,
permission to reprint/republish this material for advertising or promotional
purposes or for creating new collective works for resale or redistribution to
servers or lists, or to reuse any copyrighted component of this work in other
works must be obtained from the IEEE.)
- C. Gates (2009) Coordinated Scan Detection. In Proceedings of
the 16th Annual Network & Distributed System Security Symposium (NDSS).
San Diego, CA. February 8-11, 2009. Acceptance Rate: 12% (20/171).
(pdf)
- M. Bishop, S. Engle, S. Peisert, S. Whalen, and C. Gates (2009) Case
Studies of an Insider Framework. In Proceedings of the 42nd Hawaii
International Conference on System Sciences (HICSS). Waikoloa, Hawaii.
January 5-8, 2009. (pdf)
- A. Jerbi, E. Hadar, C. Gates, and D. Grebenev (2008) An Access Control
Reference Architecture. In Proceedings of the 2nd Computer Security
Architecture Workshop. Fairfax, VA. October 31, 2008.
(pdf)
- M. Bishop, S. Engle, S. Peisert, S. Whalen, and C. Gates (2008) We Have
Met the Enemy and He Is Us. In Proceedings of the 2008 New Security
Paradigms Workshop (NSPW). Lake Tahoe, CA. September 22-25, 2008.
(pdf)
(Note: © ACM 2008. This is the author's version of the work. It is
posted here by permission of ACM for your personal use. Not for redistribution.
The definitive version will be published in Proceedings of the 2008 Workshop
on New Security Paradigms.)
- C. Gates and J. McHugh (2008) The Contact Surface: A Technique for
Exploring Internet Scale Emergent Behaviors. In Proceedings of the
Fifth Conference on Detection of Intrusions and Malware & Vulnerability
Assessment (DIMVA). Pages 228-246. Paris, France. July 10-11, 2008.
(pdf)
- M. Bishop and C. Gates (2008) Defining the Insider Threat. In the
Fourth Annual Cyber Security and Information Intelligence (CSIIRW).
Oak Ridge, TN. May 12-14, 2008. (pdf)
- C. Gates (2008) A Case Study in Testing a Network Security Algorithm.
In Proceedings of the 4th International Conference on Testbeds and
Research Infrastructures for the Development of Networks and Communities.
Innsbruck, Austria. March 18-20, 2008. (pdf)
- M. Dunlop, C. Gates, C. Wong, and C. Wang (2007) SWorD: A Simple
Worm Detection Scheme. In Proceedings of the International Symposium
on Information Security. Pages 1752-1769. Algarve, Portugal.
November 26-30, 2007. Acceptance Rate: 24% (20/82).
(pdf)
- C. Gates, C. Taylor, and M. Bishop (2007) Dependable Security: Testing
Network Intrusion Detection Systems. In Proceedings of the Third Workshop
on Hot Topics in System Dependability (HotDep'07). Edinburgh, Scotland.
June 26, 2007. (pdf)
- C. Gates (2007) Access Control Requirements for Web 2.0 Security and
Privacy. Position Paper accepted to the Workshop on Web 2.0 Security and
Privacy. Oakland, CA. May 24, 2007. (pdf)
- T. Whalen and C. Gates (2007) A Psychological Profile of Defender
Personality Traits. Journal of Computers. 2.2: 84-93. April 2007. (pdf)
- B. Trammell and C. Gates (2006) NAF: The NetSA Aggregated Flow Tool
Suite. In Proceedings of the 20th Large Installation Systems
Administration Conference (LISA 2006). Pages 221-231. Washington, DC.
December 3 - 8, 2006. (pdf)
- C. Gates and C. Taylor (2006) Challenging the Anomaly Detection Paradigm:
A Provocative Discussion. In Proceedings of the 2006 New Security
Paradigms Workshop (NSPW). Pages 21-29. Schloss-Dagstuhl, Germany.
September 18-21, 2006. Acceptance Rate: 32% (12/38).
(pdf) (ps)
(Note: © ACM 2006. This is the author's version of the work. It is
posted here by permission of ACM for your personal use. Not for redistribution.
The definitive version will be published in Proceedings of the 2006 Workshop
on New Security Paradigms.)
- C. Gates, J. McNutt, J. Kadane, and M. Kellner (2006) Scan Detection on
Very Large Networks Using Logistic Regression Modeling. In Proceedings
of the IEEE Symposium on Computers and Communications. Pages 402-407.
Pula-Cagliari, Sardinia, Italy. June 26-29, 2006.
-- Acceptance Rate: 46% (161/348). -->
(pdf)
(Note: © 2005 IEEE. Personal use of this material is permitted. However,
permission to reprint/republish this material for advertising or promotional
purposes or for creating new collective works for resale or redistribution to
servers or lists, or to reuse any copyrighted component of this work in other
works must be obtained from the IEEE.)
- M. Collins, C. Gates, and G. Kataria (2006) A Model for Opportunistic
Network Exploits: The Case of P2P Worms. Workshop on the Economics of
Information Security (WEIS). Cambridge, UK. June 26-28, 2006.
(pdf)
- C. Gates, J. McNutt, J. Kadane, and M. Kellner (2006) Detecting Scans
at the ISP Level. Technical Report CMU/SEI-2006-TR-005, Carnegie Mellon
University Software Engineering Institute. April 2006. (pdf)
- C. Gates and T. Whalen (2006) Personal Information on the Web:
Methodological Challenges and Approaches. In the CHI 2006 Workshop on
Privacy and HCI: Methodologies for Studying Privacy Issues. Montreal,
Canada. April 23, 2006.
- T. Whalen and C. Gates (2006) Defender Personality Traits. In
Proceedings of the Workshop on Intelligence and Security Informatics.
Pages 85-91. Singapore. April 9, 2006. Acceptance Rate: 16% (15/92).
- C. Gates (2006) Co-ordinated Port Scans: A Model, A Detector and An
Evaluation Methodology. PhD Thesis. Dalhousie University. February, 2006.
(pdf)(ps)
- T. Whalen and C. Gates (2006) Defender Personality Traits.
Technical Report CS-2006-01, Dalhousie University. (pdf)
(ps)
- C. Gates and T. Whalen (2005) Private Lives: User Attitudes Towards
Personal Information on the Web. Technical Report CS-2005-06, Dalhousie
University. (pdf)
(ps)
- C. Gates and D. Becknel. (2005) Host Anomalies from Network Data.
In Proceedings from the Sixth IEEE Systems, Man and Cybernetics
Information Assurance Workshop. Pages 325-332. West Point, New
York. June 15 - 17, 2005. -- Acceptance Rate: 54%. -->
(pdf)
(Note: © 2005 IEEE. Personal use of this material is permitted. However,
permission to reprint/republish this material for advertising or promotional
purposes or for creating new collective works for resale or redistribution to
servers or lists, or to reuse any copyrighted component of this work in other
works must be obtained from the IEEE.)
- T. Whalen and C. Gates. (2005) Public Perception of Private Information
on Search Engines. Technical Report CS-2005-02, Dalhousie University. (pdf)
(ps)
- J.R. Binkley, J. Mchugh, and C. Gates (2005) Locality, Network Control,
and Anomaly Detection. Technical Report 04-04, Portland State University. (ps)
- C. Gates, M. Collins, M. Duggan, A. Kompanek, and M. Thomas. (2004)
More NetFlow Tools: For Performance and Security. In Proceedings of the
18th Large Installation Systems Administration Conference (LISA 2004).
Pages 121 - 132. Atlanta, Georgia. November 14 - 19, 2004. Acceptance Rate:
31% (22/70).
(pdf) (ps)
- C. Gates and T. Whalen. (2004) Profiling the Defenders. To appear in
Proceedings of the 2004 New Security Paradigms Workshop (NSPW 2004).
Nova Scotia, Canada. September 20 - 23, 2004. Acceptance Rate: 24% (12/51)
(pdf) (ps)
(Note: © ACM 2004. This is the author's version of the work. It is
posted here by permission of ACM for your personal use. Not for
redistribution. The definitive version will be published in Proceedings
of the 2004 Workshop on New Security Paradigms
http://doi.acm.org/10.1145/1065907.1066044)
- J. McHugh, C. Gates, and D. Becknel. (2004) Situational Awareness and
Network Traffic Analysis. In Proceedings of the Gdansk NATO Workshop
on Cyberspace Security and Defence: Research Issues. Pages 209 - 228,
Gdansk, Poland. September 6 - 9, 2004.
- C. Gates and J. Rouse. (2003) The Yearly Review, or How to Evaluate
Your Sys Admin. In Proceedings of the 17th Systems Administration
Conference (LISA 2003). Pages 95 - 104. San Diego, California.
October 26 - 31, 2003. Acceptance Rate: 25% (24/96).
(pdf) (ps)
- C. Gates and J. Slonim. (2003) Owner-Controlled Information. In
Proceedings of the 2003 New Security Paradigms Workshop (NSPW
2003). Pages 103 - 111. Ascona, Switzerland. August 18 - 21, 2003.
Acceptance Rate: 30% (13/43).
(pdf) (ps)
(Note: © ACM 2003. This is the author's version of the work. It is
posted here by permission of ACM for your personal use. Not for
redistribution. The definitive version was published in Proceedings
of the 2003 Workshop on New Security Paradigms
http://doi.acm.org/10.1145/986655.986670)
- J. McHugh and C. Gates. (2003) Locality: A New Paradigm for Thinking
About Normal Behavior and Outsider Threat. In Proceedings of the 2003
New Security Paradigms Workshop (NSPW 2003). Pages 3 - 10. Ascona,
Switzerland. August 18 - 21, 2003. Acceptance Rate: 30% (13/43).
(pdf)
(http://portal.acm.org/citation.cfm?doid=986655.986657)
- C. Gates. (2003) The Modeling and Detection of Distributed Port Scans:
A Thesis Proposal. Technical Report CS-2003-01, Dalhousie University. (pdf)
(ps)
- J. Slonim, M. McAllister, K. Rockwood, T. Chiasson, C. Gates, and K.
Hawkey. (2001) A Human-Centric Architecture for Personalization and Privacy.
SSGRR 2001 Italy, August 2001.
- J. Slonim, T. Chiasson, C. Gates and M. McAllister. (2001) An
extensible, human-centric framework that promotes universal access to
electronic commerce. In Proceedings of the 2nd International Symposium
on Electronic Commerce Technologies . Pages 116 - 126. Hong Kong,
China. April 26 - 28, 2001.
- T. Chiasson and C. Gates. (2000) Electronic commerce universal access
device - the knowledge-acquiring layered infrastructure (KALI) project.
ACM Crossroads. 7.1: 28 - 32.
- J. Slonim, T. Chiasson and C. Gates. (2000) Creating an electronic
commerce device which promotes universal access: the KALI project.
Lecture Notes in Computer Science. 1830: 2 - 12.
- I. Caines, C. Gates, R. Guy and R. Nowakowski. (1999) Periods in
taking and splitting games. American Mathematical Monthly, 106: 359 -
361.
- C. Gates. (1995) Optimisation of lighting design application by
implementation on high performance parallel computing hardware. Edinburgh
Parallel Computing Centre. Technical Report SS-95-15.
(gzip'd ps)
- C. Gates. (1995) The Application of Neural Networks to the Prediction
of the Conductivity of Water. Masters Thesis. Dalhousie University.
- C. Gates. (1994) Why don't nets work for Peter? APICS Annual
Computer Science Conference Proceedings. Acadia University. Wolfville,
Nova Scotia.