메뉴 건너뛰기




Volumn , Issue , 2009, Pages 233-

Implementing PII honeytokens to mitigate against the threat of malicous insiders

Author keywords

[No Author keywords available]

Indexed keywords

ACCESSING DATA; CASE DATABASE; CREDIT CARDS; DIGITAL INFORMATION; E-MAIL ADDRESS; EARLY WARNING SYSTEM; EXTENSIVE RESOURCES; FOREIGN COUNTRIES; FULL-SWING; GOVERNMENT EMPLOYEES; HONEY NET; HONEYPOTS; IDENTITY THEFT; INSIDER THREAT; MALICIOUS INSIDERS; NATIONAL SECURITY; PERSONAL INFORMATION; PERSONALLY IDENTIFIABLE INFORMATION; PHYSICAL SYSTEMS; PRESIDENTIAL ELECTION; RISK PROFILE; SEARCH RESULTS; SENSITIVE INFORMATIONS; TELEPHONE NUMBERS; WORK IN PROGRESS;

EID: 70350061913     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISI.2009.5137315     Document Type: Conference Paper
Times cited : (12)

References (5)
  • 2
    • 70350070114 scopus 로고    scopus 로고
    • Honeypot technologies and their applicability as an internal countermeasure
    • Inderscience Publishers, Geneva, Switzerland
    • C. Valli, "Honeypot technologies and their applicability as an internal countermeasure", International Journal of Information and Computer Security, Inderscience Publishers, Geneva, Switzerland, 2007, pp. 430-436.
    • (2007) International Journal of Information and Computer Security , pp. 430-436
    • Valli, C.1
  • 4
    • 84869261838 scopus 로고    scopus 로고
    • Using synthetic decoys to digitally watermark personally-identifying data and to promote data security
    • Las Vegas, Nevada, USA, Jun
    • J. White and D. R. Thompson, "Using synthetic decoys to digitally watermark personally-identifying data and to promote data security," Proc. Int'l Conf. Security and Management (SAM), Las Vegas, Nevada, USA, Jun., 2006.
    • (2006) Proc. Int'l Conf. Security and Management (SAM)
    • White, J.1    Thompson, D.R.2
  • 5
    • 15944397574 scopus 로고    scopus 로고
    • J. Yuill, M. Zappe, D. Denning, and F. Feer, Honeyfiles: Deceptive Files for Intrusion Detection, Proceedings of the 2004 IEEE Workshop on Information Assurance, IEEE publishers, West Point, NY, June 2004, pp. 116-122.
    • J. Yuill, M. Zappe, D. Denning, and F. Feer, "Honeyfiles: Deceptive Files for Intrusion Detection", Proceedings of the 2004 IEEE Workshop on Information Assurance, IEEE publishers, West Point, NY, June 2004, pp. 116-122.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.