Analysis of Research on Specific Insider Information Security Threats
暂无分享,去创建一个
Natalia G. Miloslavskaya | Anatoly Malyuk | Anton Zaytsev | A. Malyuk | N. Miloslavskaya | A. Zaytsev
[1] Dawn M. Cappelli,et al. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .
[2] David A. Mundie,et al. The justification of a pattern for detecting intellectual property theft by departing insiders , 2012 .
[3] Lyndsey Franklin,et al. Predictive Modeling for Insider Threat Mitigation , 2009 .
[4] Lori Flynn,et al. Best practices against insider threats for all nations , 2012, 2012 Third Worldwide Cybersecurity Summit (WCS).
[5] Dawn M. Cappelli,et al. A Preliminary Model of Insider Theft of Intellectual Property , 2011 .
[6] Andrew P. Moore,et al. A pattern for increased monitoring for intellectual property theft by departing insiders , 2011, PLoP '11.
[7] Dawn M. Cappelli,et al. Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector , 2005 .
[8] Mariki M. Eloff,et al. Psychosocial risks: Can their effects on the security of information systems really be ignored? , 2013, Inf. Manag. Comput. Secur..
[9] Thomas Bozek,et al. Research on Mitigating the Insider Threat to Information Systems - #2 , 2000 .
[10] Frank L. Greitzer,et al. Identifying at-risk employees: A behavioral model for predicting potential insider threats , 2010 .
[11] C. Colwill,et al. Dealing with the malicious insider , 2008 .
[12] Randall F. Trzeciak,et al. Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector , 2012 .