Profiling file repository access patterns for identifying data exfiltration activities
暂无分享,去创建一个
[1] Hung Q. Ngo,et al. Towards a theory of insider threat assessment , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[2] Stephen H. Conrad,et al. A behavioral theory of insider-threat risks: A system dynamics approach , 2008, TOMC.
[3] Gregory Stephens,et al. Statistical profiling and visualization for detection of malicious insider attacks on computer networks , 2004, VizSEC/DMSEC '04.
[4] Andreas Karlsson,et al. Elementary Survey Sampling , 2007, Technometrics.
[5] Michael Gertz,et al. Data profiling and the access path model: a step toward addressing insider misuse in database systems , 2005 .
[6] Malek Ben Salem,et al. A Survey of Insider Attack Detection Research , 2008, Insider Attack and Cyber Security.
[7] Geoffrey H. Kuenning,et al. Detecting insider threats by monitoring system call activity , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[8] Yali Liu,et al. SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack , 2008, 2009 42nd Hawaii International Conference on System Sciences.
[9] Steven B. Lipner,et al. A comment on the confinement problem , 1975, SOSP.
[10] E. Cole,et al. Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft , 2005 .
[11] Thomas Bozek,et al. Research on Mitigating the Insider Threat to Information Systems - #2 , 2000 .