DR. CARRIE E. GATES

carrie.gates@gmail.com
http://www.cs.dal.ca/~gates

Publications

  1. M. Bishop, C. Gates and K. Levitt (2018). Arguing for Argumentation in Break the Glass Scenarios. In Proceedings of the 2018 New Security Paradigms Workshop. Windsor, UK. 28-31 August 2018. (To Appear)

  2. E. Stobert, R. Biddle and C. Gates (2016). Mobile Device Security: Hopes and Fears. In Passwords 2016. Bochum, Germany. 5-7 December 2016

  3. C. Gates and P. Matthews (2014). Data is the New Currency. In Proceedings of the 2014 New Security Paradigms Workshop. Victoria, Canada. 15-18 September 2014.

  4. C. Gates and P. Matthews (2013). The Internet of Things, CA Technology Exchange 4:3, November 2013.

  5. M. Bishop, K. Butler, C. Gates, S. Greenspan and E. Rine Butler (2013) Forgive and Forget: Return to Obscurity. In Proceedings of the 2013 New Security Paradigms Workshop. Banff, Canada. 9-12 September 2013.

  6. J. Ard, M. Bishop, C. Gates and M.X. Sun (2013) Information Behaving Badly. In Proceedings of the 2013 New Security Paradigms Workshop. Banff, Canada. 9-12 September 2013.

  7. M. MacDonald, C. Gates, T. Taylor, D. Paterson and S. Brooks (2013). Stability Visualizations as a Low-complexity Descriptor of Network Host Behaviour. Procedia Computer Science. 19: 984-991.

  8. C. Gates and S. Engle (2013) Reflecting on Visualization for Cyber Security. In Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics (ISI). Seattle, WA. 4-7 June 2013.

  9. Y. Li, A. Somayaji and C. Gates (2013) Fine Grained Access Control Using Email Social Networks. CA Technology Exchange. 4(1): 29-41. January 2013.

  10. M. Bishop, M. Doroud, C. Gates and J. Hunker (2012) Attribution in the Future Internet: The Second Summer of the Sisterhood. In Proceedings of the 11th European Conference on Information Warfare and Security. Laval, France. 5-6 July, 2012.

  11. M. Bishop, C. Gates, P. Yellowlees and G. Silberman (2011) Facebook Goes to the Doctor. In Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies. Orlando, FL., December 6, 2011.

  12. J. Hunker, C. Gates and M. Bishop (2011) Attribution Requirements for Next Generation Internets. In Proceedings of the 2011 IEEE International Conference on Technologies for Homeland Security. Waltham, MA. November 15-17, 2011.

  13. C. Gates and M. Bishop (2011) One of These Records Is Not Like the Other. In Proceedings of the 3rd Usenix Workshop on the Theory and Practice of Provenance. Crete, Greece. June 20-21, 2011.

  14. S. Laqua, M.A. Sasse, C. Gates, and S. Greenspan (2011) Do you KnowDis? A User Study of Knowledge Discovery Tool for Organizations. In Proceedings of the 2011 ACM CHI Conference on Human Factors in Computing Systems. Vancouver, Canada. May 7-12, 2011.

  15. J. Glanfield, D. Paterson, C. Smith, T. Taylor, S. Brooks, C. Gates, and J. McHugh (2010) FloVis: Leveraging Visualization to Protect Sensitive Network Infrastructure. In Proceedings of the NATO Information Systems Technology Panel Symposium on Information Assurance and Cyber Defense. Tallinn, Estonia. November 22-23, 2010.

  16. S.Brunza, O. McCusker, J. Glanfield, D. Paterson, C. Gates, and J. McHugh (2010) Combining Trust and Behavioral Analysis to Detect Security Threats. In Proceedings of the NATO Information Systems Technology Panel Symposium on Information Assurance and Cyber Defense. Tallinn, Estonia. November 22-23, 2010.

  17. M. Bishop, S. Engle, D. Frincke, C. Gates, F. Greitzer, S. Peisert, and S. Whalen (2010) A Risk Management Approach to the "Insider Threat". To appear in Insider Threats in Cybersecurity — And Beyond. Springer Verlag, Berlin, DE.

  18. C. Gates and M. Bishop (2010) The Security and Privacy Implications of Using Social Networks to Deliver Healthcare. In Proceedings of the 3rd ACM International Conferenc on Pervasive Technologies Related to Assistive Environments (PETRA). Samos, Greece. June 23-25, 2010.

  19. J. Glanfield, D. Paterson, C. Smith, T. Taylor, S. Brooks, C. Gates, and J. McHugh (2010) FloVis: Leveraging Visualization to Protect Sensitive Network Infrastructure. Accepted to the NATO Information Systems Technology Panel Symposium on Information Assurance and Cyber Defense. Antalya, Turkey. April 26-27, 2010.

  20. S.Brunza, O. McCusker, J. Glanfield, D. Paterson, C. Gates, and J. McHugh (2010) Combining Trust and Behavioral Analysis to Detect Security Threats. Accepted to the NATO Information Systems Technology Panel Symposium on Information Assurance and Cyber Defense. Antalya, Turkey. April 26-27, 2010.

  21. T. Whalen and C. Gates (2010) Watching the watchers: "voluntary monitoring" of Infosec employees. Information Management and Computer Security. Vol. 18. No. 1.

  22. E. Hadar and C. Gates (2009) Cloud Computing Web-Services Offering and IT Management Aspects. Accepted to the Cloud Computing Workshop at the International Conference on Object Oriented Programming, Systems, Languages and Applications OOPSLA 2009. Orlando, FL. October 25, 2009.

  23. J. Glanfield, S. Brooks, T. Taylor, D. Paterson, C Smith, C. Gates, J. McHugh (2009) OverFlow: An Overview Visualization for Network Analysis. Accepted to the 6th International Workshop on Visualization for Cyber Security. Atlantic City, NJ. October 11, 2009.

  24. M. Bishop, C. Gates and J. Hunker (2009) Sisterhood of the Travelling Packets. Accepted to the 2009 New Security Paradigms Workshop. Oxford, UK. September 8-11, 2009.

  25. T. Whalen and C. Gates (2009) Watchdog or Guardian? Unpacking the Issues Surrounding the Monitoring of InfoSec Employees. In Proceedings of the 2009 International Symposium on Human Aspects of Information Security & Assurance. Athens, Greece. June 25-26, 2009.

  26. M. Bishop, D. Frincke, C. Gates and F. Greitzer (2009) AZALIA: and A to Z Assesment of the Likelihood of Insider Attack. In Proceedings of the 2009 IEEE International Conference on Technologies for Homeland Security. Waltham, MA. May 11-12, 2009. (pdf)
    (Note: © 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.)

  27. S. Laqua, A. Sasse, C. Gates and S. Greenspan (2009) Making Sense of the Unknown: Knowledge Dissemination in Organizations. In the 2nd Sensemaking Workshop. Boston, MA. April 4-5, 2009. (pdf)

  28. T. Taylor, D. Paterson, J. Glanfield, C. Gates, S. Brooks, J. McHugh (2009) FloVis: Flow Visualization System. In Proceedings of the Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH). Washington, DC. March 3-4, 2009. (pdf)
    (Note: © 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.)

  29. C. Gates (2009) Coordinated Scan Detection. In Proceedings of the 16th Annual Network & Distributed System Security Symposium (NDSS). San Diego, CA. February 8-11, 2009. Acceptance Rate: 12% (20/171). (pdf)

  30. M. Bishop, S. Engle, S. Peisert, S. Whalen, and C. Gates (2009) Case Studies of an Insider Framework. In Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS). Waikoloa, Hawaii. January 5-8, 2009. (pdf)

  31. A. Jerbi, E. Hadar, C. Gates, and D. Grebenev (2008) An Access Control Reference Architecture. In Proceedings of the 2nd Computer Security Architecture Workshop. Fairfax, VA. October 31, 2008. (pdf)

  32. M. Bishop, S. Engle, S. Peisert, S. Whalen, and C. Gates (2008) We Have Met the Enemy and He Is Us. In Proceedings of the 2008 New Security Paradigms Workshop (NSPW). Lake Tahoe, CA. September 22-25, 2008. (pdf)
    (Note: © ACM 2008. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version will be published in Proceedings of the 2008 Workshop on New Security Paradigms.)

  33. C. Gates and J. McHugh (2008) The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors. In Proceedings of the Fifth Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Pages 228-246. Paris, France. July 10-11, 2008. (pdf)

  34. M. Bishop and C. Gates (2008) Defining the Insider Threat. In the Fourth Annual Cyber Security and Information Intelligence (CSIIRW). Oak Ridge, TN. May 12-14, 2008. (pdf)

  35. C. Gates (2008) A Case Study in Testing a Network Security Algorithm. In Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities. Innsbruck, Austria. March 18-20, 2008. (pdf)

  36. M. Dunlop, C. Gates, C. Wong, and C. Wang (2007) SWorD: A Simple Worm Detection Scheme. In Proceedings of the International Symposium on Information Security. Pages 1752-1769. Algarve, Portugal. November 26-30, 2007. Acceptance Rate: 24% (20/82). (pdf)

  37. C. Gates, C. Taylor, and M. Bishop (2007) Dependable Security: Testing Network Intrusion Detection Systems. In Proceedings of the Third Workshop on Hot Topics in System Dependability (HotDep'07). Edinburgh, Scotland. June 26, 2007. (pdf)

  38. C. Gates (2007) Access Control Requirements for Web 2.0 Security and Privacy. Position Paper accepted to the Workshop on Web 2.0 Security and Privacy. Oakland, CA. May 24, 2007. (pdf)

  39. T. Whalen and C. Gates (2007) A Psychological Profile of Defender Personality Traits. Journal of Computers. 2.2: 84-93. April 2007. (pdf)

  40. B. Trammell and C. Gates (2006) NAF: The NetSA Aggregated Flow Tool Suite. In Proceedings of the 20th Large Installation Systems Administration Conference (LISA 2006). Pages 221-231. Washington, DC. December 3 - 8, 2006. (pdf)

  41. C. Gates and C. Taylor (2006) Challenging the Anomaly Detection Paradigm: A Provocative Discussion. In Proceedings of the 2006 New Security Paradigms Workshop (NSPW). Pages 21-29. Schloss-Dagstuhl, Germany. September 18-21, 2006. Acceptance Rate: 32% (12/38). (pdf) (ps)
    (Note: © ACM 2006. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version will be published in Proceedings of the 2006 Workshop on New Security Paradigms.)

  42. C. Gates, J. McNutt, J. Kadane, and M. Kellner (2006) Scan Detection on Very Large Networks Using Logistic Regression Modeling. In Proceedings of the IEEE Symposium on Computers and Communications. Pages 402-407. Pula-Cagliari, Sardinia, Italy. June 26-29, 2006. (pdf)
    (Note: © 2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.)

  43. M. Collins, C. Gates, and G. Kataria (2006) A Model for Opportunistic Network Exploits: The Case of P2P Worms. Workshop on the Economics of Information Security (WEIS). Cambridge, UK. June 26-28, 2006. (pdf)

  44. C. Gates, J. McNutt, J. Kadane, and M. Kellner (2006) Detecting Scans at the ISP Level. Technical Report CMU/SEI-2006-TR-005, Carnegie Mellon University Software Engineering Institute. April 2006. (pdf)

  45. C. Gates and T. Whalen (2006) Personal Information on the Web: Methodological Challenges and Approaches. In the CHI 2006 Workshop on Privacy and HCI: Methodologies for Studying Privacy Issues. Montreal, Canada. April 23, 2006.

  46. T. Whalen and C. Gates (2006) Defender Personality Traits. In Proceedings of the Workshop on Intelligence and Security Informatics. Pages 85-91. Singapore. April 9, 2006. Acceptance Rate: 16% (15/92).

  47. C. Gates (2006) Co-ordinated Port Scans: A Model, A Detector and An Evaluation Methodology. PhD Thesis. Dalhousie University. February, 2006. (pdf)(ps)

  48. T. Whalen and C. Gates (2006) Defender Personality Traits. Technical Report CS-2006-01, Dalhousie University. (pdf) (ps)

  49. C. Gates and T. Whalen (2005) Private Lives: User Attitudes Towards Personal Information on the Web. Technical Report CS-2005-06, Dalhousie University. (pdf) (ps)

  50. C. Gates and D. Becknel. (2005) Host Anomalies from Network Data. In Proceedings from the Sixth IEEE Systems, Man and Cybernetics Information Assurance Workshop. Pages 325-332. West Point, New York. June 15 - 17, 2005. (pdf)
    (Note: © 2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.)

  51. T. Whalen and C. Gates. (2005) Public Perception of Private Information on Search Engines. Technical Report CS-2005-02, Dalhousie University. (pdf) (ps)

  52. J.R. Binkley, J. Mchugh, and C. Gates (2005) Locality, Network Control, and Anomaly Detection. Technical Report 04-04, Portland State University. (ps)

  53. C. Gates, M. Collins, M. Duggan, A. Kompanek, and M. Thomas. (2004) More NetFlow Tools: For Performance and Security. In Proceedings of the 18th Large Installation Systems Administration Conference (LISA 2004). Pages 121 - 132. Atlanta, Georgia. November 14 - 19, 2004. Acceptance Rate: 31% (22/70). (pdf) (ps)

  54. C. Gates and T. Whalen. (2004) Profiling the Defenders. To appear in Proceedings of the 2004 New Security Paradigms Workshop (NSPW 2004). Nova Scotia, Canada. September 20 - 23, 2004. Acceptance Rate: 24% (12/51) (pdf) (ps)
    (Note: © ACM 2004. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version will be published in Proceedings of the 2004 Workshop on New Security Paradigms http://doi.acm.org/10.1145/1065907.1066044)

  55. J. McHugh, C. Gates, and D. Becknel. (2004) Situational Awareness and Network Traffic Analysis. In Proceedings of the Gdansk NATO Workshop on Cyberspace Security and Defence: Research Issues. Pages 209 - 228, Gdansk, Poland. September 6 - 9, 2004.

  56. C. Gates and J. Rouse. (2003) The Yearly Review, or How to Evaluate Your Sys Admin. In Proceedings of the 17th Systems Administration Conference (LISA 2003). Pages 95 - 104. San Diego, California. October 26 - 31, 2003. Acceptance Rate: 25% (24/96). (pdf) (ps)

  57. C. Gates and J. Slonim. (2003) Owner-Controlled Information. In Proceedings of the 2003 New Security Paradigms Workshop (NSPW 2003). Pages 103 - 111. Ascona, Switzerland. August 18 - 21, 2003. Acceptance Rate: 30% (13/43). (pdf) (ps)
    (Note: © ACM 2003. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of the 2003 Workshop on New Security Paradigms http://doi.acm.org/10.1145/986655.986670)

  58. J. McHugh and C. Gates. (2003) Locality: A New Paradigm for Thinking About Normal Behavior and Outsider Threat. In Proceedings of the 2003 New Security Paradigms Workshop (NSPW 2003). Pages 3 - 10. Ascona, Switzerland. August 18 - 21, 2003. Acceptance Rate: 30% (13/43). (pdf)
    (http://portal.acm.org/citation.cfm?doid=986655.986657)

  59. C. Gates. (2003) The Modeling and Detection of Distributed Port Scans: A Thesis Proposal. Technical Report CS-2003-01, Dalhousie University. (pdf) (ps)

  60. J. Slonim, M. McAllister, K. Rockwood, T. Chiasson, C. Gates, and K. Hawkey. (2001) A Human-Centric Architecture for Personalization and Privacy. SSGRR 2001 Italy, August 2001.

  61. J. Slonim, T. Chiasson, C. Gates and M. McAllister. (2001) An extensible, human-centric framework that promotes universal access to electronic commerce. In Proceedings of the 2nd International Symposium on Electronic Commerce Technologies . Pages 116 - 126. Hong Kong, China. April 26 - 28, 2001.

  62. T. Chiasson and C. Gates. (2000) Electronic commerce universal access device - the knowledge-acquiring layered infrastructure (KALI) project. ACM Crossroads. 7.1: 28 - 32.

  63. J. Slonim, T. Chiasson and C. Gates. (2000) Creating an electronic commerce device which promotes universal access: the KALI project. Lecture Notes in Computer Science. 1830: 2 - 12.

  64. I. Caines, C. Gates, R. Guy and R. Nowakowski. (1999) Periods in taking and splitting games. American Mathematical Monthly, 106: 359 - 361.

  65. C. Gates. (1995) Optimisation of lighting design application by implementation on high performance parallel computing hardware. Edinburgh Parallel Computing Centre. Technical Report SS-95-15. (gzip'd ps)

  66. C. Gates. (1995) The Application of Neural Networks to the Prediction of the Conductivity of Water. Masters Thesis. Dalhousie University.

  67. C. Gates. (1994) Why don't nets work for Peter? APICS Annual Computer Science Conference Proceedings. Acadia University. Wolfville, Nova Scotia.