메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 790-791

Applying role based access control and genetic algorithms to insider threat detection

Author keywords

[No Author keywords available]

Indexed keywords

MAPPING RULES; SECURITY POLICIES; THREAT DETECTION;

EID: 34248344588     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1185448.1185638     Document Type: Conference Paper
Times cited : (28)

References (6)
  • 1
    • 33846299959 scopus 로고    scopus 로고
    • Intrusion Detection in RBAC-administered Databases
    • E. Bertino, A. Kamra, E. Terzi, and A. Vakali, "Intrusion Detection in RBAC-administered Databases," CERIAS TR, 2005-70, 2005.
    • (2005) CERIAS TR , vol.2005 -70
    • Bertino, E.1    Kamra, A.2    Terzi, E.3    Vakali, A.4
  • 2
    • 3042637621 scopus 로고    scopus 로고
    • P. G. Bradford, M. Brown, J. Perdue, and B. Seif, Towards Proactive Computer-System Forensics, Proc. of International Conference on Information Technology: Coding and Computing, 2, 2004 (ITCC 2004), 648-652.
    • P. G. Bradford, M. Brown, J. Perdue, and B. Seif, "Towards Proactive Computer-System Forensics," Proc. of International Conference on Information Technology: Coding and Computing, Vol. 2, 2004 (ITCC 2004), 648-652.
  • 5
    • 0002472452 scopus 로고
    • Genetic Algorithms and the Optimal Allcation of Trials
    • J. H. Holland, "Genetic Algorithms and the Optimal Allcation of Trials," SIAM Journal on Computing, Vol. 2, No. 2, 88-105, 1973.
    • (1973) SIAM Journal on Computing , vol.2 , Issue.2 , pp. 88-105
    • Holland, J.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.