메뉴 건너뛰기




Volumn , Issue , 2009, Pages

SIDD: A framework for detecting sensitive data exfiltration by an insider attack

Author keywords

[No Author keywords available]

Indexed keywords

EDGE DETECTION; FEATURE EXTRACTION; SIGNAL PROCESSING; TRAFFIC SURVEYS;

EID: 63349106731     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2009.390     Document Type: Conference Paper
Times cited : (59)

References (28)
  • 2
    • 0010886652 scopus 로고    scopus 로고
    • The insider threat to information systems: The psychology of the dangerous insider
    • Sept
    • E. D. Shaw, K. G. Ruby, and J. M. Post, "The insider threat to information systems: The psychology of the dangerous insider", Security Awareness Bulletin, vol. 2-98, pp. 27-46, Sept. 1998.
    • (1998) Security Awareness Bulletin , vol.2-98 , pp. 27-46
    • Shaw, E.D.1    Ruby, K.G.2    Post, J.M.3
  • 7
    • 37249042679 scopus 로고    scopus 로고
    • Remote wireless transmission and error recovery of log data
    • Y. Zhao, N. Li, and C. Wang., "Remote wireless transmission and error recovery of log data", Applied Geophysics, vol. 4, pp. 308-312, 2007.
    • (2007) Applied Geophysics , vol.4 , pp. 308-312
    • Zhao, Y.1    Li, N.2    Wang, C.3
  • 8
    • 63349086607 scopus 로고    scopus 로고
    • skype, http://www.skype.com
    • skype, http://www.skype.com
  • 9
    • 21844443126 scopus 로고    scopus 로고
    • Steganography and steganalysis in voice-over IP scenarios: Operational aspects and first experiences with a new steganalysis tool set
    • Magdeburg
    • J. Dittmann, D. Hesse, and R. Hillert, "Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set", Proceedings of SPIE on Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 607-618, Magdeburg, 2005.
    • (2005) Proceedings of SPIE on Security, Steganography, and Watermarking of Multimedia Contents VII , vol.5681 , pp. 607-618
    • Dittmann, J.1    Hesse, D.2    Hillert, R.3
  • 11
    • 84904224992 scopus 로고    scopus 로고
    • Steganalysis of images created using current steganography software
    • David Aucsmith Ed, Information Hiding, Springer-Verlag Berlin Heidelberg
    • N.F. Johnson, and S. Jajodia, "Steganalysis of images created using current steganography software", David Aucsmith (Ed.): Information Hiding, LNCS 1525, pp. 32-47. Springer-Verlag Berlin Heidelberg, 1998.
    • (1998) LNCS , vol.1525 , pp. 32-47
    • Johnson, N.F.1    Jajodia, S.2
  • 14
    • 62849120844 scopus 로고    scopus 로고
    • A Survey of Techniques for Internet Traffic Classification using Machine Learning
    • to appear in
    • T.T.T. Nguyen and G. Armitage, "A Survey of Techniques for Internet Traffic Classification using Machine Learning", to appear in IEEE Communications Surveys and Tutorials, 2008.
    • (2008) IEEE Communications Surveys and Tutorials
    • Nguyen, T.T.T.1    Armitage, G.2
  • 21
    • 84925680300 scopus 로고    scopus 로고
    • Video transcoding architectures and techniques: An overview
    • Mar
    • A. Vetro, C. Christopoulos, and H. Sun, "Video transcoding architectures and techniques: an overview", Signal Processing Magazine, IEEE, vol. 20, no. 2, pp. 18-29, Mar 2003.
    • (2003) Signal Processing Magazine, IEEE , vol.20 , Issue.2 , pp. 18-29
    • Vetro, A.1    Christopoulos, C.2    Sun, H.3
  • 22
    • 63349110207 scopus 로고    scopus 로고
    • C. Rowland, http://www.firstmonday.dk/issues/issue25/rowland/
    • Rowland, C.1
  • 24
    • 56649091138 scopus 로고    scopus 로고
    • A novel audio Steganalysis based on high order statistics of a distortion measure with Hausdorff distance
    • 11th Information Security ConferenceISC
    • Y. Liu, K. Chiang, C. Corbett, R. Archibald, B. Mukherjee, and D. Ghosal, "A novel audio Steganalysis based on high order statistics of a distortion measure with Hausdorff distance", 11th Information Security Conference(ISC) 2008, Lecture Notes in Computer Science, Vol. 5222, pp. 487-500.
    • (2008) Lecture Notes in Computer Science , vol.5222 , pp. 487-500
    • Liu, Y.1    Chiang, K.2    Corbett, C.3    Archibald, R.4    Mukherjee, B.5    Ghosal, D.6
  • 27
    • 0036452586 scopus 로고    scopus 로고
    • Detecting hidden messages using higherorder statistical models
    • H. Farid, "Detecting hidden messages using higherorder statistical models", IEEE International Conference on Image Processing, vol. 2, pp. 905-908, 2002.
    • (2002) IEEE International Conference on Image Processing , vol.2 , pp. 905-908
    • Farid, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.