메뉴 건너뛰기




Volumn , Issue , 2009, Pages 93-102

Detecting malicious insider threats using a null affinity temporal three dimensional matrix relation

Author keywords

[No Author keywords available]

Indexed keywords

DATA ITEMS; MALICIOUS INSIDERS; NEW APPROACHES; PROBLEM DECOMPOSITION; RELATED MATRICES; SECURITY PROCEDURES; THREE DIMENSIONAL MATRICES; TIME FRAME;

EID: 71549144844     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (14)
  • 4
    • 84956982801 scopus 로고    scopus 로고
    • Learning Fingerprints for a Database IDS
    • Proceedings of the 7th European Symposium on Research in Comp. Security, Springer-Verlag, London
    • Lee, S. Y., Low, W. L., and Wong, P. Y. Learning Fingerprints for a Database IDS. In Proceedings of the 7th European Symposium on Research in Comp. Security. LNCS, vol. 2502. Springer-Verlag, London, 264-280, 2002.
    • (2002) LNCS , vol.2502 , pp. 264-280
    • Lee, S.Y.1    Low, W.L.2    Wong, P.Y.3
  • 5
    • 38049029757 scopus 로고    scopus 로고
    • th Intl. Database Engineering and Applications Symposium (IDEAS'03), 2003
    • th Intl. Database Engineering and Applications Symposium (IDEAS'03), 2003
  • 6
    • 0015397231 scopus 로고
    • Problem Decomposition and Data Reorganization by a Clustering Technique
    • McCormick W., Schweitzer P., White, T. Problem Decomposition and Data Reorganization by a Clustering Technique, Operations Research. 993-1009, 1972.
    • (1972) Operations Research , vol.993-1009
    • McCormick, W.1    Schweitzer, P.2    White, T.3
  • 8
    • 74749105434 scopus 로고    scopus 로고
    • Ramakrishnan, R. and Gehrke, J. Database Management Systems. 3rd. McGraw-Hill. 2002
    • Ramakrishnan, R. and Gehrke, J. Database Management Systems. 3rd. McGraw-Hill. 2002
  • 11
    • 0034325396 scopus 로고    scopus 로고
    • Detecting masquerades in intrusion detection based on unpopular commands
    • Schonlau, M. and Theus, M. Detecting masquerades in intrusion detection based on unpopular commands. In Information Processing Letters, vol. 76, 33-38, 2000.
    • (2000) Information Processing Letters , vol.76 , pp. 33-38
    • Schonlau, M.1    Theus, M.2
  • 13
    • 33646031830 scopus 로고    scopus 로고
    • Using Attack Trees to Identify Malicious Attacks from Authorized Insiders
    • Milan, Italy, pp
    • Ray, I., and Poolsappasit, N. Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. In ESORICS 2005, Milan, Italy, pp. 231-246, 2005.
    • (2005) ESORICS , pp. 231-246
    • Ray, I.1    Poolsappasit, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.