Insider Threat Indicator Ontology

ix

[1]  Joon S. Park,et al.  Role-based profile analysis for scalable and accurate insider-anomaly detection , 2006, 2006 IEEE International Performance Computing and Communications Conference.

[2]  Ewan Klein,et al.  Natural Language Processing with Python , 2009 .

[3]  Hung Q. Ngo,et al.  Insider Threat Analysis Using Information-Centric Modeling , 2007, IFIP Int. Conf. Digital Forensics.

[4]  Steffen Schulze-Kremer,et al.  Adding Semantics to Genome Databases: Towards an Ontology for Molecular Biology , 1997, ISMB.

[5]  M. Ashburner,et al.  Gene Ontology: tool for the unification of biology , 2000, Nature Genetics.

[6]  David A. Mundie,et al.  Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions , 2013, 2013 Third Workshop on Socio-Technical Aspects in Security and Trust.

[7]  Dawn M. Cappelli,et al.  The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .

[8]  Ted E. Senator,et al.  Context-Aware Insider Threat Detection , 2013, AAAI 2013.

[9]  Yuval Shahar,et al.  A Framework for Knowledge-Based Temporal Abstraction , 1997, Artif. Intell..

[10]  Bradley Malin,et al.  Detection of anomalous insiders in collaborative environments via relational analysis of access logs , 2011, CODASPY '11.

[11]  James F. Allen Maintaining knowledge about temporal intervals , 1983, CACM.

[12]  Peter F. Patel-Schneider,et al.  OWL 2 Web Ontology Language Primer (Second Edition) , 2012 .

[13]  Barack Obama Executive Order 13587: Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information , 2011 .

[14]  L. Burton Intention , 2011 .

[15]  Alexander Löser,et al.  KrakeN: N-ary Facts in Open Information Extraction , 2012, AKBC-WEKEX@NAACL-HLT.

[16]  Eugene Santos,et al.  Intent-Driven Insider Threat Detection in Intelligence Analyses , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[17]  J. Novak The Theory Underlying Concept Maps and How To Construct Them , 2004 .

[18]  José Maria Parente de Oliveira,et al.  Conceptual Maps as the First Step in an Ontology Construction Method , 2010, 2010 14th IEEE International Enterprise Distributed Object Computing Conference Workshops.

[19]  Aldo Gangemi,et al.  Ontology Design Patterns for Semantic Web Content , 2005, SEMWEB.

[20]  Matthew West Developing High Quality Data Models , 2011 .

[21]  Stephen H. Conrad,et al.  A behavioral theory of insider-threat risks: A system dynamics approach , 2008, TOMC.

[22]  Hyuk-Chul Kwon,et al.  Cyber Forensics Ontology for Cyber Criminal Investigation , 2009, e-Forensics.

[23]  Diego Calvanese,et al.  The Description Logic Handbook: Theory, Implementation, and Applications , 2003, Description Logic Handbook.

[24]  Dimitris Gritzalis,et al.  Proactive insider threat detection through social media: the YouTube case , 2013, WPES.

[25]  Carrie Gates,et al.  Defining the insider threat , 2008, CSIIRW '08.

[26]  Marcus A. Maloof,et al.  Detecting Insider Theft of Trade Secrets , 2009, IEEE Security & Privacy.

[27]  Mark S. Fox,et al.  The Role of Competency Questions in Enterprise Engineering , 1995 .

[28]  Rafael A. Calvo,et al.  Concept Map Mining: A Definition and a Framework for Its Evaluation , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[29]  Marcus A. Maloof,et al.  elicit: A System for Detecting Insiders Who Violate Need-to-Know , 2007, RAID.

[30]  Thomas R. Gruber,et al.  A translation approach to portable ontology specifications , 1993, Knowl. Acquis..

[31]  Kim-Kwang Raymond Choo,et al.  An integrated conceptual digital forensic framework for cloud computing , 2012, Digit. Investig..

[32]  Ian Horrocks,et al.  Description Logics , 2008, Handbook of Knowledge Representation.

[33]  Lawrence B. Holder,et al.  Insider Threat Detection Using a Graph-Based Approach , 2010 .

[34]  Simon Edward Parkin,et al.  An information security ontology incorporating human-behavioural implications , 2009, SIN '09.

[35]  Frank van Harmelen,et al.  Web Ontology Language: OWL , 2004, Handbook on Ontologies.

[36]  Robert Stevens,et al.  Putting OWL in Order: Patterns for Sequences in OWL , 2006, OWLED.

[37]  Stefan Fenz,et al.  Formalizing information security knowledge , 2009, ASIACCS '09.

[38]  Anand Natarajan,et al.  Towards a Social Network Approach for Monitoring Insider Threats to Information Security , 2004, ISI.

[39]  Steven Bird,et al.  NLTK: The Natural Language Toolkit , 2002, ACL.

[40]  Lundy Lewis,et al.  Insider threat detection using situation-aware MAS , 2008, 2008 11th International Conference on Information Fusion.

[41]  Leo Obrst,et al.  Developing an Ontology of the Cyber Security Domain , 2012, STIDS.

[42]  Andrew P. Moore,et al.  Common Sense Guide to Mitigating Insider Threats 4th Edition , 2012 .

[43]  Zheng Luo,et al.  Ontology-based model of network and computer attacks for security assessment , 2013, Journal of Shanghai Jiaotong University (Science).

[44]  Deborah A. Frincke,et al.  Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation , 2010, Insider Threats in Cyber Security.

[45]  Randy Borum,et al.  Behavioral Science Guidelines for Assessing Insider Threats , 2008 .

[46]  David Brumley,et al.  Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.

[47]  Thomas R. Gruber,et al.  The Role of Common Ontology in Achieving Sharable, Reusable Knowledge Bases , 1991, KR.