Behavior model for detecting data exfiltration in network environment
暂无分享,去创建一个
[1] Malek Ben Salem,et al. A Survey of Insider Attack Detection Research , 2008, Insider Attack and Cyber Security.
[2] Salvatore J. Stolfo,et al. Insider Attack and Cyber Security - Beyond the Hacker , 2008, Advances in Information Security.
[3] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[4] Tarem Ahmed,et al. Online Anomaly Detection Using KDE , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[5] Gurvirender P. Tejay,et al. Developing insider attack detection model: A grounded approach , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.
[6] Biswanath Mukherjee,et al. SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack , 2008, 2009 42nd Hawaii International Conference on System Sciences.
[7] Kenton Born. Browser-Based Covert Data Exfiltration , 2010, ArXiv.
[8] Suraj Nellikar. Insider threat simulation and performance analysis of insider detection algorithms with role based models , 2010 .
[9] Akaninyene Walter Udoeyop,et al. Cyber Profiling for Insider Threat Detection , 2010 .
[10] Rosa Haydée Baranzano. Non-parametric kernel density estimation- based permutation test: Implementation and comparisons. , 2011 .
[11] Carol J. Fung. Collaborative Intrusion Detection Networks and Insider Attacks , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..