메뉴 건너뛰기




Volumn , Issue , 2005, Pages 108-117

Towards a theory of insider threat assessment

Author keywords

[No Author keywords available]

Indexed keywords

INSIDER THREAT ASSESSMENT;

EID: 27544447707     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2005.94     Document Type: Conference Paper
Times cited : (117)

References (21)
  • 1
    • 27544480141 scopus 로고    scopus 로고
    • CERT/United States Secret Service/CSO, 2004.
    • 2004 E-Crime Watch Survey: Summary Of Findings. CERT/United States Secret Service/CSO, 2004. http://www.cert.org/archive/pdf/ 2004eCrimeWatchSuramary. pdf.
    • 2004 E-crime Watch Survey: Summary of Findings
  • 3
    • 0032058198 scopus 로고    scopus 로고
    • Proof verification and the hardness of approximation problems
    • S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof Verification And The Hardness Of Approximation Problems. J. ACM, 45(3):501-555, 1998.
    • (1998) J. ACM , vol.45 , Issue.3 , pp. 501-555
    • Arora, S.1    Lund, C.2    Motwani, R.3    Sudan, M.4    Szegedy, M.5
  • 4
    • 0031651077 scopus 로고    scopus 로고
    • Probabilistic checking of proofs: A new characterization of NP
    • S. Arora and S. Safra. Probabilistic Checking Of Proofs: A New Characterization Of NP. J. ACM, 45(1):70-122, 1998.
    • (1998) J. ACM , vol.45 , Issue.1 , pp. 70-122
    • Arora, S.1    Safra, S.2
  • 5
    • 27544507919 scopus 로고    scopus 로고
    • On the hardness of approximating the Min-Hack problem
    • Computer Science and Engineering, SUNY at Buffalo.
    • R. Chinchani, D. Ha, A. Iyer, H. Q. Ngo, and S. Upadhyaya. On the hardness of approximating the Min-Hack problem. 2005. Technical Report 2005-05. Computer Science and Engineering, SUNY at Buffalo.
    • (2005) Technical Report , vol.2005 , Issue.5
    • Chinchani, R.1    Ha, D.2    Iyer, A.3    Ngo, H.Q.4    Upadhyaya, S.5
  • 7
    • 2642519111 scopus 로고
    • Privilege graph: An extension to the typed access matrix model
    • M. Dacier and Y. Deswarte. Privilege graph: an extension to the typed access matrix model. In ESORICS, pages 319-334, 1994.
    • (1994) ESORICS , pp. 319-334
    • Dacier, M.1    Deswarte, Y.2
  • 9
    • 0030100766 scopus 로고    scopus 로고
    • Interactive proofs and the hardness of approximating cliques
    • U. Feige, S. Goldwasser, L. Lovász, S. Safra, and M. Szegedy. Interactive Proofs And The Hardness Of Approximating Cliques. J. ACM, 43(2):268-292, 1996.
    • (1996) J. ACM , vol.43 , Issue.2 , pp. 268-292
    • Feige, U.1    Goldwasser, S.2    Lovász, L.3    Safra, S.4    Szegedy, M.5
  • 10
    • 0004127488 scopus 로고
    • W. H. Freeman and Co., San Francisco, Calif., A Guide To The Theory Of NP-Completeness, A Series of Books in the Mathematical Sciences.
    • M. R. Garey and D. S. Johnson. Computers and Intractability. W. H. Freeman and Co., San Francisco, Calif., 1979. A Guide To The Theory Of NP-Completeness, A Series of Books in the Mathematical Sciences.
    • (1979) Computers and Intractability.
    • Garey, M.R.1    Johnson, D.S.2
  • 12
    • 27544461231 scopus 로고    scopus 로고
    • Some recent strong inapproximability results
    • Algorithm theory - SWAT'98 (Stockholm) Springer, Berlin
    • J. Håstad. Some Recent Strong Inapproximability Results. In Algorithm theory - SWAT'98 (Stockholm), volume 1432 of Lecture Notes in Comput. Sci., pages 205-209. Springer, Berlin, 1998.
    • (1998) Lecture Notes in Comput. Sci. , vol.1432 , pp. 205-209
    • Håstad, J.1
  • 13
    • 0030671781 scopus 로고    scopus 로고
    • Some optimal inapproximability results
    • (electronic). ACM, New York
    • J. Håstad. Some Optimal Inapproximability Results. In STOC '97 (El Paso, TX), pages 1-10 (electronic). ACM, New York, 1999.
    • (1999) STOC '97 (El Paso, TX) , pp. 1-10
    • Håstad, J.1
  • 15
    • 0032057911 scopus 로고    scopus 로고
    • On syntactic versus computational views of approximability
    • (electronic)
    • S. Khanna, R. Motwani, M. Sudan, and U. Vazirani. On Syntactic Versus Computational Views Of Approximability. SIAM J. Comput., 28(1):164-191 (electronic), 1999.
    • (1999) SIAM J. Comput. , vol.28 , Issue.1 , pp. 164-191
    • Khanna, S.1    Motwani, R.2    Sudan, M.3    Vazirani, U.4
  • 17
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operation security
    • September/October
    • R. Ortalo, Y. Dewarte, and M. Kaaniche. Experimenting With Quantitative Evaluation Tools For Monitoring Operation Security. IEEE Transactions on Software Engineering, 25(5):633-650, September/October 1999.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Dewarte, Y.2    Kaaniche, M.3
  • 18
    • 0026366408 scopus 로고
    • Optimization, approximation, and complexity classes
    • C. H. Papadimitriou and M. Yannakakis. Optimization, Approximation, And Complexity Classes. J. Comput. System Sci., 43(3):425-440, 1991.
    • (1991) J. Comput. System Sci. , vol.43 , Issue.3 , pp. 425-440
    • Papadimitriou, C.H.1    Yannakakis, M.2
  • 19


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.