Managing Malicious Insider Risk through BANDIT
暂无分享,去创建一个
[1] Christian W. Probst,et al. Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[2] George Cybenko,et al. HBML: A Language for Quantitative Behavioral Modeling in the Human Terrain , 2009 .
[3] Marcus A. Maloof,et al. Detecting Insider Theft of Trade Secrets , 2009, IEEE Security & Privacy.
[4] Lynn F. Fischer,et al. Ten Tales of Betrayal: The Threat to Corporate Infrastructure by Information Technology Insiders Analysis and Observations , 2005 .
[5] Shari Lawrence Pfleeger,et al. Insiders Behaving Badly: Addressing Bad Actors and Their Actions , 2010, IEEE Transactions on Information Forensics and Security.
[6] Roy H. Campbell,et al. Distributed Security Policy Conformance , 2011, SEC.
[7] Vincent H. Berk,et al. Effectively identifying user profiles in network and host metrics , 2010, Defense + Commercial Sensing.
[8] Marcus A. Maloof,et al. elicit: A System for Detecting Insiders Who Violate Need-to-Know , 2007, RAID.
[9] R. F.,et al. Statistical Method from the Viewpoint of Quality Control , 1940, Nature.
[10] D. Vose. Risk Analysis: A Quantitative Guide , 2000 .