메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Graph-based approaches to insider threat detection

Author keywords

Graph based anomaly detection; Insider threat.

Indexed keywords

GRAPH THEORETIC APPROACH; GRAPH-BASED; GRAPH-BASED ANOMALY DETECTION; ILLEGAL ACTIVITIES; INSERTIONS AND DELETIONS; INSIDER THREAT.; MINIMUM DESCRIPTION LENGTH PRINCIPLE; STRUCTURAL PATTERN;

EID: 70350696017     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1558607.1558658     Document Type: Conference Paper
Times cited : (4)

References (13)
  • 1
    • 67650349484 scopus 로고    scopus 로고
    • ITRC Beach Meter Reaches 342, to Date
    • June 30
    • Foley, L., "ITRC Beach Meter Reaches 342, to Date", Reuters, June 30, 2008.
    • (2008) Reuters
    • Foley, L.1
  • 3
    • 0033391133 scopus 로고    scopus 로고
    • Fast spinning into oblivion? Recent developments in money-laundering policies and offshore finance centres
    • June
    • Hampton, M. and Levi, M. Fast spinning into oblivion? Recent developments in money-laundering policies and offshore finance centres. Third World Quartely, Vol. 20, Num 3, June 1999, pp. 645-656, 1999.
    • (1999) Third World Quartely , vol.20 , Issue.3 , pp. 645-656
    • Hampton, M.1    Levi, M.2
  • 4
    • 51349123114 scopus 로고    scopus 로고
    • Anomaly Detection in Data Represented as Graphs
    • Eberle, W. and Holder, L. Anomaly Detection in Data Represented as Graphs. Intelligent Data Analysis Journal, Volume 11(6), 2007.
    • (2007) Intelligent Data Analysis Journal , vol.11 , Issue.6
    • Eberle, W.1    Holder, L.2
  • 8
    • 32644465248 scopus 로고    scopus 로고
    • Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
    • Randazzo, M., Keeney, M., Kowalski, E., Cappelli, D. and Moore, A.. "Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector," http://www.cert.org/insider-threat/, 2004.
    • (2004)
    • Randazzo, M.1    Keeney, M.2    Kowalski, E.3    Cappelli, D.4    Moore, A.5
  • 9
    • 67650380184 scopus 로고    scopus 로고
    • Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector
    • Kowalski, E., Cappelli, D. and Moore, A.. "Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector," http://www.cert.org/insider-threat/, 2008.
    • (2008)
    • Kowalski, E.1    Cappelli, D.2    Moore, A.3
  • 10
    • 67650355861 scopus 로고    scopus 로고
    • Insider Threat Study: Illicit Cyber Activity in the Government Sector
    • Kowalski, E., Conway, T., Keverline, S., Williams, M., Cappelli, D. and Moore, A.. "Insider Threat Study: Illicit Cyber Activity in the Government Sector," http://www.cert.org/insider-threat/, 2008.
    • (2008)
    • Kowalski, E.1    Conway, T.2    Keverline, S.3    Williams, M.4    Cappelli, D.5    Moore, A.6
  • 11
    • 42549147508 scopus 로고    scopus 로고
    • An AI framework for the automatic assessment of e-government forms
    • Spring
    • Chun, A." An AI framework for the automatic assessment of e-government forms," AI Magazine, Volume 29, Spring 2008.
    • (2008) AI Magazine , vol.29
    • Chun, A.1
  • 12
    • 70350627889 scopus 로고    scopus 로고
    • 2006 AFCE Report to the Nation on Occupational Fraud & Abuse, Association of Certified Fraud Examiners, 2006.
    • 2006 AFCE Report to the Nation on Occupational Fraud & Abuse, Association of Certified Fraud Examiners, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.