Counteracting Malicious Insider’s Activity within Funds Transfer Systems
暂无分享,去创建一个
[1] S. Kavun,et al. Influence Determination of Social Responsibility to the Productivity Enterprise Activity Level , 2016 .
[2] B. Peterson. Red Flags and Black Markets: Trends in Financial Crime and the Global Banking Response , 2013 .
[3] M. Williams,et al. Under the Corporate Radar: Examining Insider Business Cybercrime Victimization through an Application of Routine Activities Theory , 2019 .
[4] Sergii Kavun,et al. Complex systems modeling with intelligent control elements , 2017, Int. J. Model. Simul. Sci. Comput..
[5] Lawrence B. Holder,et al. Graph-based approaches to insider threat detection , 2009, CSIIRW '09.
[6] Dawn M. Cappelli,et al. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .
[7] Joseph E. Finnerty. Insiders' Activity and Inside Information: A Multivariate Analysis , 1976, Journal of Financial and Quantitative Analysis.
[8] Sergii Kavun,et al. Techniques for Performance Improvement of Integer Multiplication in Cryptographic Applications , 2014 .
[9] Steven Furnell,et al. Insider Threat Prediction Tool: Evaluating the probability of IT misuse , 2002, Comput. Secur..
[10] Ioanna Kantzavelou,et al. A game-based intrusion detection mechanism to confront internal attackers , 2010, Comput. Secur..
[11] Mykola Holovatyi. The state and society: the conceptual foundations and social interaction in the context of formation and functioning of states , 2015 .
[12] Sergii Kavun. Conceptual fundamentals of a theory of mathematical interpretation , 2015, Int. J. Comput. Sci. Math..
[13] Mingtian Zhou,et al. Cyber Insider Threats Situation Awareness Using Game Theory and Information Fusion-based User Behavior Predicting Algorithm , 2011 .
[14] A. A. Kuznetsov,et al. THE STATISTICAL ANALYSIS OF A NETWORK TRAFFIC FOR THE INTRUSION DETECTION AND PREVENTION SYSTEMS , 2015 .
[15] David P. Williamson,et al. An Experimental Evaluation of the Best-of-Many Christofides’ Algorithm for the Traveling Salesman Problem , 2015, Algorithmica.
[16] Yoav Shoham,et al. Computer science and game theory , 2008, CACM.
[17] Dawn M. Cappelli,et al. Common Sense Guide to Mitigating Insider Threats 4th Edition , 2012 .
[18] Sergii Kavun,et al. Intelligent management of the enterprise personnel security system , 2018, 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT).
[19] V. Kalashnikov,et al. Enterprise Insider Detection as an Integer Programming Problem , 2012 .
[20] Robert,et al. Information Technology in Domain of Electronic Intelligence and Cyberterrorism Combat , 2015 .
[21] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[22] Sergii Kavun. Indicative-geometric method for estimation of any business entity , 2016, Int. J. Data Anal. Tech. Strateg..
[23] Joseph D. Piotroski,et al. The Influence of Analysts, Institutional Investors, and Insiders on the Incorporation of Market, Industry, and Firm-Specific Information into Stock Prices , 2004 .