An Insider Threat Prediction Model
暂无分享,去创建一个
Dimitris Gritzalis | Alexios Mylonas | Marianthi Theoharidou | Miltiadis Kandias | Nikos Virvilis | M. Theoharidou | D. Gritzalis | Miltiadis Kandias | Alexios Mylonas | Nikos Virvilis
[1] Anthony J. Puleo. Mitigating Insider Threat Using Human Behavior Influence Models , 2012 .
[2] Vijaya Bhaskar Velpula,et al. Behavior-Anomaly-Based System for Detecting Insider Attacks and Data Mining , 2009 .
[3] Marcus K. Rogers,et al. A social learning theory and moral disengagement analysis of criminal computer behavior: an exploratory study , 2001 .
[4] E. Eugene Schultz. A framework for understanding and predicting insider attacks , 2002, Comput. Secur..
[5] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[6] Marcus A. Maloof,et al. Detecting Insider Theft of Trade Secrets , 2009, IEEE Security & Privacy.
[7] Evangelos A. Kiountouzis,et al. The insider threat to information systems and the effectiveness of ISO17799 , 2005, Comput. Secur..
[8] Steven Furnell,et al. A preliminary model of end user sophistication for insider threat prediction in IT systems , 2005, Comput. Secur..
[9] Lilian Mitrou,et al. Employees' privacy vs. employers' security: Can they be balanced? , 2006, Telematics Informatics.
[10] V. Rao Vemuri,et al. Using Text Categorization Techniques for Intrusion Detection , 2002, USENIX Security Symposium.
[11] Lance Spitzner,et al. Honeypots: catching the insider threat , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[12] A. Liu,et al. A comparison of system call feature representations for insider threat detection , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[13] Ray Hunt,et al. A taxonomy of network and computer attacks , 2005, Comput. Secur..
[14] Steven Furnell,et al. Insider Threat Prediction Tool: Evaluating the probability of IT misuse , 2002, Comput. Secur..
[15] Stephen H. Conrad,et al. Building A System For Insider Security , 2009, IEEE Security & Privacy.
[16] Malek Ben Salem,et al. Designing Host and Network Sensors to Mitigate the Insider Threat , 2009, IEEE Security & Privacy.
[17] Georg Rasch,et al. Probabilistic Models for Some Intelligence and Attainment Tests , 1981, The SAGE Encyclopedia of Research Design.
[18] Thomas Bozek,et al. Research on Mitigating the Insider Threat to Information Systems - #2 , 2000 .
[19] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[20] Geoffrey H. Kuenning,et al. Detecting insider threats by monitoring system call activity , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[21] Paul Thompson,et al. Weak models for insider threat detection , 2004, SPIE Defense + Commercial Sensing.
[22] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..