Use of Domain Knowledge to Detect Insider Threats in Computer Activities
暂无分享,去创建一个
[1] Dawn M. Cappelli,et al. Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors , 2005 .
[2] Lawrence B. Holder,et al. Insider Threat Detection Using a Graph-Based Approach , 2010 .
[3] Robert H. Anderson,et al. Understanding the Insider Threat , 2004 .
[4] Malek Ben Salem,et al. A Survey of Insider Attack Detection Research , 2008, Insider Attack and Cyber Security.
[5] Dawn M. Cappelli,et al. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .
[6] Robert H. Anderson,et al. Understanding the Insider Threat: Proceedings of a March 2004 Workshop , 2005 .
[7] Jay Yoon Lee,et al. Fast Anomaly Discovery Given Duplicates , 2012 .
[8] Joshua Glasser,et al. Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data , 2013, 2013 IEEE Security and Privacy Workshops.
[9] Dawn M. Cappelli,et al. Insider Threat Study: Illicit Cyber Activity in the Government Sector , 2008 .