Insider Threat Indicator Ontology
暂无分享,去创建一个
Matthew L Collins | Daniel L Costa | Michael J Albrethsen | Matthew Collins | Daniel Costa | Michael Albrethsen
[1] Joon S. Park,et al. Role-based profile analysis for scalable and accurate insider-anomaly detection , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[2] Ewan Klein,et al. Natural Language Processing with Python , 2009 .
[3] Hung Q. Ngo,et al. Insider Threat Analysis Using Information-Centric Modeling , 2007, IFIP Int. Conf. Digital Forensics.
[4] Steffen Schulze-Kremer,et al. Adding Semantics to Genome Databases: Towards an Ontology for Molecular Biology , 1997, ISMB.
[5] M. Ashburner,et al. Gene Ontology: tool for the unification of biology , 2000, Nature Genetics.
[6] David A. Mundie,et al. Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions , 2013, 2013 Third Workshop on Socio-Technical Aspects in Security and Trust.
[7] Dawn M. Cappelli,et al. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .
[8] Ted E. Senator,et al. Context-Aware Insider Threat Detection , 2013, AAAI 2013.
[9] Yuval Shahar,et al. A Framework for Knowledge-Based Temporal Abstraction , 1997, Artif. Intell..
[10] Bradley Malin,et al. Detection of anomalous insiders in collaborative environments via relational analysis of access logs , 2011, CODASPY '11.
[11] James F. Allen. Maintaining knowledge about temporal intervals , 1983, CACM.
[12] Peter F. Patel-Schneider,et al. OWL 2 Web Ontology Language Primer (Second Edition) , 2012 .
[13] Barack Obama. Executive Order 13587: Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information , 2011 .
[14] L. Burton. Intention , 2011 .
[15] Alexander Löser,et al. KrakeN: N-ary Facts in Open Information Extraction , 2012, AKBC-WEKEX@NAACL-HLT.
[16] Eugene Santos,et al. Intent-Driven Insider Threat Detection in Intelligence Analyses , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[17] J. Novak. The Theory Underlying Concept Maps and How To Construct Them , 2004 .
[18] José Maria Parente de Oliveira,et al. Conceptual Maps as the First Step in an Ontology Construction Method , 2010, 2010 14th IEEE International Enterprise Distributed Object Computing Conference Workshops.
[19] Aldo Gangemi,et al. Ontology Design Patterns for Semantic Web Content , 2005, SEMWEB.
[20] Matthew West. Developing High Quality Data Models , 2011 .
[21] Stephen H. Conrad,et al. A behavioral theory of insider-threat risks: A system dynamics approach , 2008, TOMC.
[22] Hyuk-Chul Kwon,et al. Cyber Forensics Ontology for Cyber Criminal Investigation , 2009, e-Forensics.
[23] Diego Calvanese,et al. The Description Logic Handbook: Theory, Implementation, and Applications , 2003, Description Logic Handbook.
[24] Dimitris Gritzalis,et al. Proactive insider threat detection through social media: the YouTube case , 2013, WPES.
[25] Carrie Gates,et al. Defining the insider threat , 2008, CSIIRW '08.
[26] Marcus A. Maloof,et al. Detecting Insider Theft of Trade Secrets , 2009, IEEE Security & Privacy.
[27] Mark S. Fox,et al. The Role of Competency Questions in Enterprise Engineering , 1995 .
[28] Rafael A. Calvo,et al. Concept Map Mining: A Definition and a Framework for Its Evaluation , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[29] Marcus A. Maloof,et al. elicit: A System for Detecting Insiders Who Violate Need-to-Know , 2007, RAID.
[30] Thomas R. Gruber,et al. A translation approach to portable ontology specifications , 1993, Knowl. Acquis..
[31] Kim-Kwang Raymond Choo,et al. An integrated conceptual digital forensic framework for cloud computing , 2012, Digit. Investig..
[32] Ian Horrocks,et al. Description Logics , 2008, Handbook of Knowledge Representation.
[33] Lawrence B. Holder,et al. Insider Threat Detection Using a Graph-Based Approach , 2010 .
[34] Simon Edward Parkin,et al. An information security ontology incorporating human-behavioural implications , 2009, SIN '09.
[35] Frank van Harmelen,et al. Web Ontology Language: OWL , 2004, Handbook on Ontologies.
[36] Robert Stevens,et al. Putting OWL in Order: Patterns for Sequences in OWL , 2006, OWLED.
[37] Stefan Fenz,et al. Formalizing information security knowledge , 2009, ASIACCS '09.
[38] Anand Natarajan,et al. Towards a Social Network Approach for Monitoring Insider Threats to Information Security , 2004, ISI.
[39] Steven Bird,et al. NLTK: The Natural Language Toolkit , 2002, ACL.
[40] Lundy Lewis,et al. Insider threat detection using situation-aware MAS , 2008, 2008 11th International Conference on Information Fusion.
[41] Leo Obrst,et al. Developing an Ontology of the Cyber Security Domain , 2012, STIDS.
[42] Andrew P. Moore,et al. Common Sense Guide to Mitigating Insider Threats 4th Edition , 2012 .
[43] Zheng Luo,et al. Ontology-based model of network and computer attacks for security assessment , 2013, Journal of Shanghai Jiaotong University (Science).
[44] Deborah A. Frincke,et al. Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation , 2010, Insider Threats in Cyber Security.
[45] Randy Borum,et al. Behavioral Science Guidelines for Assessing Insider Threats , 2008 .
[46] David Brumley,et al. Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.
[47] Thomas R. Gruber,et al. The Role of Common Ontology in Achieving Sharable, Reusable Knowledge Bases , 1991, KR.