Caught in the act of an insider attack: detection and assessment of insider threat
暂无分享,去创建一个
[1] Steven Furnell,et al. Insider Threat Prediction Tool: Evaluating the probability of IT misuse , 2002, Comput. Secur..
[2] Lance Spitzner,et al. Honeypots: catching the insider threat , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[3] Geoffrey H. Kuenning,et al. Detecting insider threats by monitoring system call activity , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[4] Marcus A. Maloof,et al. elicit: A System for Detecting Insiders Who Violate Need-to-Know , 2007, RAID.
[5] Robert F. Mills,et al. Using PLSI-U to detect insider threats by datamining e-mail , 2008, Int. J. Secur. Networks.
[6] Lundy Lewis,et al. Insider threat detection using situation-aware MAS , 2008, 2008 11th International Conference on Information Fusion.
[7] Robert F. Mills,et al. Towards insider threat detection using web server logs , 2009, CSIIRW '09.
[8] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[9] Yudhijit Bhattacharjee,et al. The Danger Within , 2009, Science.
[10] Yali Liu,et al. SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack , 2008, 2009 42nd Hawaii International Conference on System Sciences.
[11] Lawrence B. Holder,et al. Insider Threat Detection Using a Graph-Based Approach , 2010 .
[12] Bhavani M. Thuraisingham,et al. Insider Threat Detection Using Stream Mining and Graph Mining , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[13] Dawn M. Cappelli,et al. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .
[14] Oliver Brdiczka,et al. Proactive Insider Threat Detection through Graph Learning and Psychological Context , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[15] Min Chen,et al. Transformation of an Uncertain Video Search Pipeline to a Sketch-Based Visual Analytics Loop , 2013, IEEE Transactions on Visualization and Computer Graphics.
[16] Sadie Creese,et al. Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection , 2013, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[17] Simson L. Garfinkel,et al. Detecting threatening insiders with lightweight media forensics , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).
[18] Oliver Brdiczka,et al. Multi-Domain Information Fusion for Insider Threat Detection , 2013, 2013 IEEE Security and Privacy Workshops.
[19] Sadie Creese,et al. Understanding Insider Threat: A Framework for Characterising Attacks , 2014, 2014 IEEE Security and Privacy Workshops.