Software decoys for insider threat
暂无分享,去创建一个
[1] Malek Ben Salem,et al. Designing Host and Network Sensors to Mitigate the Insider Threat , 2009, IEEE Security & Privacy.
[2] Frederick B. Cohen. Defense-in-depth against computer viruses , 1992, Comput. Secur..
[3] Frederick B. Cohen,et al. Operating system protection through program evolution , 1993, Comput. Secur..
[4] Chris F. Kemerer,et al. A Metrics Suite for Object Oriented Design , 2015, IEEE Trans. Software Eng..
[5] Koen De Bosschere,et al. Run-Time Randomization to Mitigate Tampering , 2007, IWSEC.
[6] Decoy Document Deployment for Effective Masquerade Attack Detection , 2011, DIMVA.
[7] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[8] Daniel Shawcross Wilkerson,et al. Winnowing: local algorithms for document fingerprinting , 2003, SIGMOD '03.
[9] Salvatore J. Stolfo,et al. Baiting Inside Attackers Using Decoy Documents , 2009, SecureComm.
[10] Christian S. Collberg,et al. The Obfuscation Executive , 2004, ISC.
[11] Terence Parr,et al. LL(*): the foundation of the ANTLR parser generator , 2011, PLDI '11.
[12] J. Bowyer Bell,et al. Cheating and Deception , 1991 .
[13] J. Yuill,et al. Honeyfiles: deceptive files for intrusion detection , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[14] Russell W. Quong,et al. Adding Semantic and Syntactic Predicates To LL(k): pred-LL(k) , 1994, CC.
[15] Miles A. McQueen,et al. Deception used for cyber defense of control systems , 2009, 2009 2nd Conference on Human System Interactions.
[16] Dorothy E. Denning,et al. Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques , 2006 .