Performance analysis of an insider threat mitigation model
暂无分享,去创建一个
[1] Mary Jean Harrold,et al. Slicing object-oriented software , 1996, Proceedings of IEEE 18th International Conference on Software Engineering.
[2] Sara Matzner,et al. Analysis and Detection of Malicious Insiders , 2005 .
[3] Terrance Goan,et al. Detecting the Misappropriation of Sensitive Information through Bottleneck Monitoring , 2005 .
[4] Brajendra Panda,et al. A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack , 2008, SEC.
[5] Martin van den Berg,et al. Focused Crawling: A New Approach to Topic-Specific Web Resource Discovery , 1999, Comput. Networks.
[6] Gurpreet Dhillon,et al. Refereed Papers: Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns , 2001 .
[7] Brajendra Panda,et al. Knowledge Extraction and Management for Insider Threat Mitigation , 2008, WOSIS.
[8] Dawn M. Cappelli,et al. Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors , 2005 .
[9] B. Panda,et al. A Knowledge-Base Model for Insider Threat Prediction , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.