-
1
-
-
34547399655
-
-
J. P. Anderson, Computer Security Threat Monitoring and Surveillance, Technical Report, James P. Anderson Company, Fort Washington, PA, April 1980; see http://csrc.nist.gov/publications/ history/ande80.pdf.
-
J. P. Anderson, "Computer Security Threat Monitoring and Surveillance," Technical Report, James P. Anderson Company, Fort Washington, PA, April 1980; see http://csrc.nist.gov/publications/ history/ande80.pdf.
-
-
-
-
2
-
-
77952396614
-
A Detection-Oriented Classification of Insider IT Misuse
-
Las Vegas, NV, April 14-15
-
A. H. Phyo and S. M. Furnell, "A Detection-Oriented Classification of Insider IT Misuse," Proceedings of the Third Security Conference, Las Vegas, NV, April 14-15, 2004.
-
(2004)
Proceedings of the Third Security Conference
-
-
Phyo, A.H.1
Furnell, S.M.2
-
3
-
-
0023294428
-
An Intrusion Detection Model
-
D. E. Denning, "An Intrusion Detection Model," IEEE Trans. Software Eng. 13, No. 2, 222-232 (1987).
-
(1987)
IEEE Trans. Software Eng
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
4
-
-
0003518833
-
Classification and Detection of Computer Intrusions,
-
Ph.D. Dissertation, Purdue University, Lafayette, IN, August
-
S. Kumar, "Classification and Detection of Computer Intrusions," Ph.D. Dissertation, Purdue University, Lafayette, IN, August 1995.
-
(1995)
-
-
Kumar, S.1
-
5
-
-
34547409487
-
-
A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava, A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection, Proceedings of the Third SIAM Conference on Data Mining, San Francisco, CA, 2003; see http://www.siam.org/meetings /sdm03/proceedings/sdm03_03.pdf.
-
A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection," Proceedings of the Third SIAM Conference on Data Mining, San Francisco, CA, 2003; see http://www.siam.org/meetings /sdm03/proceedings/sdm03_03.pdf.
-
-
-
-
6
-
-
34547401689
-
-
S. Berinato, The Global State of Information Security 2005, September 15, 2005; see http://www.cio.com/archive/091505/ global.html.
-
S. Berinato, "The Global State of Information Security 2005," September 15, 2005; see http://www.cio.com/archive/091505/ global.html.
-
-
-
-
7
-
-
34547397065
-
-
CSO magazine,2005 E-Crime Watche Survey, Summary of Findings; see http://www.cert.org/archive/pdf/ ecrimesummary05.pdf.
-
CSO magazine,"2005 E-Crime Watche Survey, Summary of Findings"; see http://www.cert.org/archive/pdf/ ecrimesummary05.pdf.
-
-
-
-
8
-
-
34547443063
-
-
M. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore, Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, Carnegie Mellon University Software Engineering Institute, Technical Report CMU/SEI-2004-TR-021, 2004; see http://www.sei.cmu.edu/publications/documents/04.reports/ 04tr021.html.
-
M. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore, "Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector," Carnegie Mellon University Software Engineering Institute, Technical Report CMU/SEI-2004-TR-021, 2004; see http://www.sei.cmu.edu/publications/documents/04.reports/ 04tr021.html.
-
-
-
-
9
-
-
34547433274
-
ChoicePoint Fraud Case Shows Need for Security Controls
-
February 22, Gartner, Inc, see
-
A. Litan, "ChoicePoint Fraud Case Shows Need for Security Controls," February 22, 2005, ID No. G00126448, Gartner, Inc.; see http://www.gartner.com/resources/126400/126448/ choicepoint_fra.pdf.
-
(2005)
ID No. G00126448
-
-
Litan, A.1
-
10
-
-
34547407434
-
-
D. Yachin, Combating Insider Threats: The Application-Level User Behavior Tracking Approach, IDC White Paper sponsored by Intellinx, 2006; see http://www.intellinx-sw.com/pdf/ IDC_White_Paper_Combating_Insider_Threats.pdf.
-
D. Yachin, "Combating Insider Threats: The Application-Level User Behavior Tracking Approach," IDC White Paper sponsored by Intellinx, 2006; see http://www.intellinx-sw.com/pdf/ IDC_White_Paper_Combating_Insider_Threats.pdf.
-
-
-
-
11
-
-
0021783476
-
A Development of APL2 Syntax
-
J. A. Brown, "A Development of APL2 Syntax," IBM J. Res. & Dev. 29, No. 1, 37-48 (1985).
-
(1985)
IBM J. Res. & Dev
, vol.29
, Issue.1
, pp. 37-48
-
-
Brown, J.A.1
|