-
1
-
-
27544447707
-
Towards a theory of insider threat assessment
-
Yokohama, Japan, June 28, July 01
-
R. Chinchani, A. Iyer, H. Ngo, S. Upadhayaya. Towards a theory of insider threat assessment. In proceedings of the 2005 International Conference of the Dependable Systems and Networks (DSN 2005). Yokohama, Japan, June 28 - July 01, 2005.
-
(2005)
proceedings of the 2005 International Conference of the Dependable Systems and Networks (DSN
-
-
Chinchani, R.1
Iyer, A.2
Ngo, H.3
Upadhayaya, S.4
-
2
-
-
48749122736
-
A Target-Centric Formal Model For Insider Threat and More
-
Technical Report October 12
-
R. Chinchani, A. Iyer, H. Ngo, S. Upadhayaya. A Target-Centric Formal Model For Insider Threat and More. Technical Report October 12, 2004.
-
(2004)
-
-
Chinchani, R.1
Iyer, A.2
Ngo, H.3
Upadhayaya, S.4
-
3
-
-
33845915969
-
Foundation of Attack trees
-
Proceedings of the Eighth Annual International Conference on Information Security and Cryptology, Seoul, Korea
-
S. Mauw, M Oostdijk. Foundation of Attack trees. In Proceedings of the Eighth Annual International Conference on Information Security and Cryptology, LNCS. Seoul, Korea, 2005.
-
(2005)
LNCS
-
-
Mauw, S.1
Oostdijk, M.2
-
4
-
-
84988504967
-
A graph-based system for network vulnerability analysis in NSPW 1998
-
New York, NY USA, ACM Press, pp
-
C. Philips, L.P. Swiler, A graph-based system for network vulnerability analysis in NSPW 1998; In Proceedings of the 1998 Workshop on New Security Paradigms. New York, NY USA, 1998 ACM Press, pp. 71-79.
-
(1998)
Proceedings of the 1998 Workshop on New Security Paradigms
, pp. 71-79
-
-
Philips, C.1
Swiler, L.P.2
-
5
-
-
48749114410
-
-
D. Ha, S. Upadhayaya, H. Ngo, S. Pramanik, R. Chinchani, S. Mathew. ICMAP: An information-Centric modeling tool for insider threat analysis. In Proceedings of the Third Annual IFIP WG 11.9 International Conference on Digital Forensics. Orlando, Florida, Jan 2007.
-
D. Ha, S. Upadhayaya, H. Ngo, S. Pramanik, R. Chinchani, S. Mathew. ICMAP: An information-Centric modeling tool for insider threat analysis. In Proceedings of the Third Annual IFIP WG 11.9 International Conference on Digital Forensics. Orlando, Florida, Jan 2007.
-
-
-
-
9
-
-
48749091977
-
-
M. Maybury, P. Chase, B. Cheikes, D. Brackne, S. Matzner, T. Hetherington, B. Wood, C. Sibley, J. Marin, T. Longstaff, L. Spitzner, J. Haile, J. Copeland, S. Lewandowski. Analysis and Detection of Malicious Insiders. In Proceedings of the 2005 International Conference on Intelligence Analysis. Sheraton Premiere, McLean, VA. May 2-4.
-
M. Maybury, P. Chase, B. Cheikes, D. Brackne, S. Matzner, T. Hetherington, B. Wood, C. Sibley, J. Marin, T. Longstaff, L. Spitzner, J. Haile, J. Copeland, S. Lewandowski. Analysis and Detection of Malicious Insiders. In Proceedings of the 2005 International Conference on Intelligence Analysis. Sheraton Premiere, McLean, VA. May 2-4.
-
-
-
-
10
-
-
24944445620
-
An Ontological Approach to the Document Access Problem of Insider Threat
-
Atlanta, Georgia, USA, May 19-20
-
B. Aleman-Meza, P. Burns, M. Eavenson, D. Palaniswami, A. Sheth. An Ontological Approach to the Document Access Problem of Insider Threat. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia, USA, May 19-20, 2005, 486-491.
-
(2005)
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI
, pp. 486-491
-
-
Aleman-Meza, B.1
Burns, P.2
Eavenson, M.3
Palaniswami, D.4
Sheth, A.5
|