메뉴 건너뛰기




Volumn , Issue , 2008, Pages 345-349

Intent-driven insider threat detection in intelligence analyses

Author keywords

[No Author keywords available]

Indexed keywords

AMOUNT OF INFORMATIONS; COGNITIVE STYLES; COMPUTATIONAL MODELS; COMPUTED DEVIATIONS; CRITICAL INFORMATIONS; DECISION-MAKING PROCESS; INSIDER THREATS; INTELLIGENCE ANALYSIS; INTELLIGENCE ANALYSTS; INTELLIGENCE COMMUNITIES; MALICIOUS INSIDERS; PILOT TESTS; TIME CONSTRAINTS; USER MODELING;

EID: 62949105495     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WIIAT.2008.376     Document Type: Conference Paper
Times cited : (18)

References (13)
  • 2
    • 0004114009 scopus 로고    scopus 로고
    • Center for the Study of Intelligence, Central Intelligence Agency
    • Heuer, R.J. (2001). "Psychology of Intelligence Analysis". Center for the Study of Intelligence, Central Intelligence Agency.
    • (2001) Psychology of Intelligence Analysis
    • Heuer, R.J.1
  • 4
    • 62949166367 scopus 로고    scopus 로고
    • The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures
    • Moore, Andrew P.; Cappelli, Dawn M. & Trzeciak, Randall F. (2008). "The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures". Tech Rep CMU/SEI-2008-TR-009
    • (2008) Tech Rep CMU/SEI-2008-TR-009
    • Moore, A.P.1    Cappelli, D.M.2    Trzeciak, R.F.3
  • 5
    • 35048848603 scopus 로고    scopus 로고
    • Towards a Social Network Approach for Monitoring Insider Threats to Information Security
    • Natarajan, Anand & Hossain, Liaquat (2004). "Towards a Social Network Approach for Monitoring Insider Threats to Information Security". Lecture Notes in Computer Science, Volume 3073. Pages 501-507.
    • (2004) Lecture Notes in Computer Science , vol.3073 , pp. 501-507
    • Natarajan, A.1    Hossain, L.2
  • 7
    • 33745931451 scopus 로고    scopus 로고
    • Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
    • Park, Joon S. & Ho, Shuyuan Mary (2004). "Composite Role-Based Monitoring (CRBM) for Countering Insider Threats". Lecture Notes in Computer Science, Volume 3073. Pages 201-213.
    • (2004) Lecture Notes in Computer Science , vol.3073 , pp. 201-213
    • Park, J.S.1    Ho, S.M.2
  • 11
    • 35048892579 scopus 로고    scopus 로고
    • Symonenko, Svetlana; Liddy, Elizabeth D. Liddy; Yilmazel, Ozgur; Zoppo, Robert Del; Brown, Eric & Downey, Matt (2004). Semantic Analysis for Monitoring Insider Threats. Lecture Notes in Computer Science, 3073. Pages 492-500.
    • Symonenko, Svetlana; Liddy, Elizabeth D. Liddy; Yilmazel, Ozgur; Zoppo, Robert Del; Brown, Eric & Downey, Matt (2004). "Semantic Analysis for Monitoring Insider Threats". Lecture Notes in Computer Science, Volume 3073. Pages 492-500.
  • 12
    • 10044278199 scopus 로고    scopus 로고
    • Weak Models for Insider Threat Detection
    • Thompson, Paul (2004). "Weak Models for Insider Threat Detection". Proceedings of SPIE.
    • (2004) Proceedings of SPIE
    • Thompson, P.1
  • 13
    • 62949133383 scopus 로고    scopus 로고
    • What Is Needed for a Good Summary. Two Different Types of Document Sets Yet Seemingly Indistinguishable to Human Users
    • IEEE Press. Maui, HI
    • Zhao Q.; Santos Jr. E.; Nguyen H.; and Mohammed A. (2006). "What Is Needed for a Good Summary. Two Different Types of Document Sets Yet Seemingly Indistinguishable to Human Users". In Proceedings of HICSS-39, IEEE Press. Maui, HI.
    • (2006) Proceedings of HICSS-39
    • Zhao, Q.1    Santos Jr., E.2    Nguyen, H.3    Mohammed, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.