Analysis and Detection of Malicious Insiders
暂无分享,去创建一个
Sara Matzner | John Copeland | Mark T. Maybury | Penny Chase | Tom Longstaff | Tom Hetherington | Jack Marin | Lance Spitzner | Brant Cheikes | Dick Brackney | Brad Wood | Scott Lewandowski | Jed Haile | T. Longstaff | S. Lewandowski | M. Maybury | J. Copeland | P. Chase | B. Cheikes | Dick Brackney | S. Matzner | Brad Wood | T. Hetherington | J. Marin | L. Spitzner | Jedediah Haile
[1] Michael Hayden. The Insider Threat to U.S. Government Information Systems , 1999 .
[2] Thomas Bozek,et al. Research on Mitigating the Insider Threat to Information Systems - #2 , 2000 .
[3] W. J. Webster. A Review of FBI Security Programs , 2002 .
[4] Katherine L. Herbig,et al. Espionage against the United States by American citizens, 1947-2001 , 2003 .
[5] Lance Spitzner,et al. Honeypots: catching the insider threat , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..