메뉴 건너뛰기




Volumn 21, Issue 6, 2002, Pages 526-531

A framework for understanding and predicting insider attacks

Author keywords

Attack indicators; Insider; Insider attack detection; Insider attack prediction; Insider attacks; Insider threat

Indexed keywords

COMPUTER SYSTEM FIREWALLS; COMPUTER SYSTEMS; INTERNET; MATHEMATICAL MODELS; PERSONNEL; REGRESSION ANALYSIS; SECURITY OF DATA;

EID: 0036395373     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(02)01009-X     Document Type: Note
Times cited : (264)

References (12)
  • 1
    • 13444290337 scopus 로고
    • Flaming: The relationship between social context cues and uninhibited verbal behavior in computer-mediated communication
    • Collins, Mauri (1992). Flaming: The relationship between social context cues and uninhibited verbal behavior in computer-mediated communication. On-line document, http://star.ucc.nau.edu/-mauri/papers/flames.html
    • (1992)
    • Collins, M.1
  • 2
    • 33646886716 scopus 로고    scopus 로고
    • Preventing and detecting insider attacks using IDS
    • Einwechter, N. (2002) Preventing and detecting insider attacks using IDS. On-line document, http://online.securityfocus.com/infocus/1558
    • (2002)
    • Einwechter, N.1
  • 4
    • 0010819094 scopus 로고    scopus 로고
    • The missing link in information security: Three dimensional profiling
    • Gudaitis, T.M. (1999). The missing link in information security: Three dimensional profiling. CyberPsychology and Behavior, Vol. 1, 4.
    • (1999) CyberPsychology and Behavior , vol.1 , pp. 4
    • Gudaitis, T.M.1
  • 7
    • 85031374879 scopus 로고    scopus 로고
    • Political Psychology Associates on-line document
    • Political Psychology Associates on-line document (2001), http://www.pol-psych.com/pubs.html
    • (2001)
  • 10
    • 25144525312 scopus 로고    scopus 로고
    • The bad boys of cyberspace: Deviant behavior in on-line multimedia communities and strategies for managing it
    • Suler, J. (1998). The bad boys of cyberspace: Deviant behavior in on-line multimedia communities and strategies for managing it. On-line document, http://www.rider.edu.users.suler.psycyber
    • Suler, J.1
  • 11
    • 0010886042 scopus 로고    scopus 로고
    • A framework for characterization of insider computer misuse
    • Unpublished paper, Purdue University, 1997
    • Tuglular, T., & Spafford, E.H. (1997). A framework for characterization of insider computer misuse. Unpublished paper, Purdue University, 1997.
    • (1997)
    • Tuglular, T.1    Spafford, E.H.2
  • 12
    • 23544478496 scopus 로고    scopus 로고
    • An insider threat model for adversary simulation
    • Wood, B.J. (2002) An insider threat model for adversary simulation. On-line document, http://www.rand.org/publications/CF/CF163/CF163.appb.pdf
    • (2002)
    • Wood, B.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.