A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications
暂无分享,去创建一个
[1] Fritz Heider,et al. Social perception and phenomenal causality. , 1944 .
[2] Luis von Ahn. Games with a Purpose , 2006, Computer.
[3] Adrian Furnham,et al. Personality traits, types, and disorders: an examination of the relationship between three self‐report measures , 2005 .
[4] E. S. Conklin. Human Motivation , 1932, The Journal of Religion.
[5] K. Scherer. Criteria for emotion-antecedent appraisal: A review. , 1988 .
[6] E. Eugene Schultz. A framework for understanding and predicting insider attacks , 2002, Comput. Secur..
[7] R. E. Christal,et al. Recurrent personality factors based on trait ratings. , 1992, Journal of personality.
[8] Nadia Magnenat-Thalmann,et al. Generic personality and emotion simulation for conversational agents , 2004, Comput. Animat. Virtual Worlds.
[9] F. Heider. The psychology of interpersonal relations , 1958 .
[10] E. Ostrom,et al. Trust and reciprocity : interdisciplinary lessons from experimental research , 2003 .
[11] P. Ekman. Unmasking The Face , 1975 .
[12] H. E. P. Cattell,et al. The original big five : A historical perspective , 1996 .
[13] Indrajit Ray,et al. Using Attack Trees to Identify Malicious Attacks from Authorized Insiders , 2005, ESORICS.
[14] David J. Pittenger,et al. The limitations of extracting typologies from trait measures of personality , 2004 .
[15] G. Bower,et al. Cognitive perspectives on emotion and motivation , 1988 .
[16] J. Asendorpf. Head‐to‐head comparison of the predictive validity of personality types and dimensions , 2003 .
[17] Alain Pinsonneault,et al. Survey Research Methodology in Management Information Systems: An Assessment , 1993, J. Manag. Inf. Syst..
[18] Shuyuan Mary Ho. Behavioral anomaly detection: A socio-technical study of trustworthiness in virtual organizations , 2009 .
[19] Elisabeth André,et al. Exploiting emotions to disambiguate dialogue acts , 2004, IUI '04.
[20] Magalie Ochs,et al. Modeling the Dynamics of Non-Player Characters' Social Relations in Video Games , 2008, AIIDE.
[21] S. Kaiser,et al. Situated emotional problem solving in interactive computer games 1 , 1996 .
[22] Kenneth L. Pike,et al. Discourse Analysis and Tagmeme Matrices , 1964 .
[23] L. R. Goldberg,et al. The language of personality: Lexical perspectives on the five-factor model. , 1996 .
[24] J. G. Holmes,et al. An Atlas of Interpersonal Situations , 2003 .
[25] Antonio Terracciano,et al. Person‐factors in the California Adult Q‐Set: closing the door on personality trait types? , 2006 .
[26] Donn B. Parker,et al. Fighting computer crime - a new framework for protecting information , 1998 .
[27] Manuel Blum,et al. reCAPTCHA: Human-Based Character Recognition via Web Security Measures , 2008, Science.
[28] P. Costa,et al. Validation of the five-factor model of personality across instruments and observers. , 1987, Journal of personality and social psychology.
[29] J. S. Wiggins,et al. The five-factor model of personality : theoretical perspectives , 1996 .
[30] Carla H. Lagorio,et al. Psychology , 1929, Nature.
[31] Shuyuan Mary Ho. A Socio-Technical Approach to Understanding Perceptions of Trustworthiness in Virtual Organizations , 2009 .
[32] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .
[33] I. Ajzen. Attitudes, Personality and Behavior , 1988 .
[34] Yi Zhu,et al. Using finite state machines for evaluating spoken dialog systems , 2010, 2010 IEEE Spoken Language Technology Workshop.
[35] Shuyuan Mary Ho. Attribution-based Anomaly Detection: Trustworthiness in an Online Community , 2008 .