메뉴 건너뛰기




Volumn 278, Issue , 2008, Pages 557-571

A knowledge-based bayesian model for analyzing a system after an insider attack

Author keywords

[No Author keywords available]

Indexed keywords

INFERENCE ENGINES; SECURITY OF DATA;

EID: 48249109086     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-09699-5_36     Document Type: Conference Paper
Times cited : (13)

References (10)
  • 2
  • 3
    • 48249085462 scopus 로고    scopus 로고
    • M. Maybury, P. Chase, B. Cheikes, D. Brackne, S. Matzner, T. Hetherington, B. Wood, C. Sibley, J. Marin, T. Longstaff, L. Spitzner, J. Haile, J. Copeland, S. Lewandowski. Analysis and Detection of Malicious Insiders. In Proceedings of the 2005 International Conference on Intelligence Analysis. Sheraton Premiere, McLean, VA. May 2-4.
    • M. Maybury, P. Chase, B. Cheikes, D. Brackne, S. Matzner, T. Hetherington, B. Wood, C. Sibley, J. Marin, T. Longstaff, L. Spitzner, J. Haile, J. Copeland, S. Lewandowski. Analysis and Detection of Malicious Insiders. In Proceedings of the 2005 International Conference on Intelligence Analysis. Sheraton Premiere, McLean, VA. May 2-4.
  • 10
    • 24944500947 scopus 로고    scopus 로고
    • Risk Management Using Based Behavior Bayesian Networks
    • Proceedings of IEEE International Conference on Intelligence and Security Informatics, ISI, Springer-Verlag, May
    • R. Dantu, P. Kolan. Risk Management Using Based Behavior Bayesian Networks. In Proceedings of IEEE International Conference on Intelligence and Security Informatics, ISI'2005, Lecture Notes in Computer Science (LNCS), pages 115-126, Springer-Verlag, May, 2005.
    • (2005) Lecture Notes in Computer Science (LNCS , pp. 115-126
    • Dantu, R.1    Kolan, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.