Detecting Insider Threat Based on Document Access Behavior Analysis
暂无分享,去创建一个
Rui Zhang | Jinqiao Shi | Fei Xu | Yiguo Pu | Xiaojun Chen
[1] Haining Wang,et al. An efficient user verification system via mouse movements , 2011, CCS '11.
[2] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[3] Marcus A. Maloof,et al. elicit: A System for Detecting Insiders Who Violate Need-to-Know , 2007, RAID.
[4] Bradley Malin,et al. Detecting Anomalous Insiders in Collaborative Information Systems , 2012, IEEE Transactions on Dependable and Secure Computing.
[5] Dieter Gollmann,et al. Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings , 2005, ESORICS.
[6] Indrajit Ray,et al. Using Attack Trees to Identify Malicious Attacks from Authorized Insiders , 2005, ESORICS.
[7] Gerard Salton,et al. A vector space model for automatic indexing , 1975, CACM.
[8] Hinrich Schütze,et al. Introduction to Information Retrieval: Scoring, term weighting, and the vector space model , 2008 .
[9] Peter Harrington,et al. Machine Learning in Action , 2012 .