-
1
-
-
33646031830
-
-
Ray, I., Poolsappasit, N.: Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, 3679, pp. 231-246. Springer, Heidelberg (2005)
-
Ray, I., Poolsappasit, N.: Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 231-246. Springer, Heidelberg (2005)
-
-
-
-
3
-
-
71549114330
-
-
Zuo, Y., Panda, B.: A Service Oriented System Based Information Flow Model for Damage Assessment. In: 6th IFIP WG 11.5 Working Conference on Integrity and Internal Control in Information Systems, Lausanne, Switzerland, November 13-14 (2003)
-
Zuo, Y., Panda, B.: A Service Oriented System Based Information Flow Model for Damage Assessment. In: 6th IFIP WG 11.5 Working Conference on Integrity and Internal Control in Information Systems, Lausanne, Switzerland, November 13-14 (2003)
-
-
-
-
4
-
-
51249123658
-
-
Carnegie Mellon University
-
Cappelli, D., Moore, A., Shimeall, T., Trzeciak, R.: Common Sense Guide to Prevention and Detection of Insider Threats, Carnegie Mellon University (2008)
-
(2008)
Common Sense Guide to Prevention and Detection of Insider Threats
-
-
Cappelli, D.1
Moore, A.2
Shimeall, T.3
Trzeciak, R.4
-
5
-
-
24644501524
-
-
Insider Threat Integrated Process Team, Department of Defense DoD-IPT, U.S. Department of Defense
-
Insider Threat Integrated Process Team, Department of Defense (DoD-IPT), 2000. DoD Insider Threat Mitigation, U.S. Department of Defense (2000)
-
(2000)
DoD Insider Threat Mitigation
-
-
-
6
-
-
84874933913
-
Research on mitigating the insider threat to information sys
-
CF-163
-
Anderson, R., Bozek, T., Logstaff, T., Meitzler, W., Skroch, M., Wyk, K.V.: Research on mitigating the insider threat to information sys., RAND Corporation Report CF-163 (2000)
-
(2000)
RAND Corporation Report
-
-
Anderson, R.1
Bozek, T.2
Logstaff, T.3
Meitzler, W.4
Skroch, M.5
Wyk, K.V.6
-
7
-
-
4243198165
-
Enemy at the Gate: Threats to Information Security
-
Whitman, M.: Enemy at the Gate: Threats to Information Security. Communications of the ACM 46(8) (2003)
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
-
-
Whitman, M.1
-
9
-
-
38149079272
-
Understanding the Insider Threat
-
March Workshop, RAND National Defense Research Institute
-
Anderson, R., Brackney, R.: Understanding the Insider Threat. In: Proceedings of a March 2004 Workshop, RAND National Defense Research Institute (2004)
-
(2004)
Proceedings of a
-
-
Anderson, R.1
Brackney, R.2
-
10
-
-
56749127015
-
Insider Threat Analysis Using Information Centric Modeling
-
Craiger, P, Shenoi, S, eds, Springer, Boston
-
Ha, D., Upadhyaya, S., Ngo, H., Pramanik, S., Chinchani, R., Mathew, S.: Insider Threat Analysis Using Information Centric Modeling. In: Craiger, P., Shenoi, S. (eds.) Advances in Digital Forensics III. Springer, Boston (2007)
-
(2007)
Advances in Digital Forensics III
-
-
Ha, D.1
Upadhyaya, S.2
Ngo, H.3
Pramanik, S.4
Chinchani, R.5
Mathew, S.6
-
11
-
-
44049089202
-
Automated Generation and Analysis of Attack Graphs
-
Oakland
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.: Automated Generation and Analysis of Attack Graphs. In: Proc. IEEE Symposium on Sec. and Priv., Oakland (2002)
-
(2002)
Proc. IEEE Symposium on Sec. and Priv
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
12
-
-
18744372151
-
Misuse detection for information retrieval systems
-
New York, NY, USA, pp
-
Cathey, R., Ma, L., Goharian, N., Grossman, D.: Misuse detection for information retrieval systems. In: CIKM 2003: Proceedings of the twelfth international conference on Information and knowledge management, New York, NY, USA, pp. 183-190 (2003)
-
(2003)
CIKM 2003: Proceedings of the twelfth international conference on Information and knowledge management
, pp. 183-190
-
-
Cathey, R.1
Ma, L.2
Goharian, N.3
Grossman, D.4
-
13
-
-
70350061913
-
Implementing PII Honeytokens to Mitigate Against the Threat of Malicious Insiders
-
Dallas, Texas, p
-
White, J., Panda, B.: Implementing PII Honeytokens to Mitigate Against the Threat of Malicious Insiders. In: Proc. of the IEEE International Conference on Intelligence and Security Informatics (ISI 2009), Dallas, Texas, p. 233 (2009)
-
(2009)
Proc. of the IEEE International Conference on Intelligence and Security Informatics (ISI
, pp. 233
-
-
White, J.1
Panda, B.2
-
14
-
-
71549144844
-
Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation
-
Milan, pp
-
White, J., Panda, B., Yaseen, Q., Nguyen, K., Li, W.: Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation. In: Proc. of the 7th Inl. Workshop on Security in Info. Sys (WOSIS 2009), Milan, pp. 93-102 (2009)
-
(2009)
Proc. of the 7th Inl. Workshop on Security in Info. Sys (WOSIS
, pp. 93-102
-
-
White, J.1
Panda, B.2
Yaseen, Q.3
Nguyen, K.4
Li, W.5
-
15
-
-
24944445620
-
-
Meza, B., Burns, P., Eavenson, M., Palaniswami, D., Sheth, A.: An ontological approach to the document access problem of insider threat. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, 3495, pp. 486-491. Springer, Heidelberg (2005)
-
Meza, B., Burns, P., Eavenson, M., Palaniswami, D., Sheth, A.: An ontological approach to the document access problem of insider threat. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, vol. 3495, pp. 486-491. Springer, Heidelberg (2005)
-
-
-
-
16
-
-
3042637621
-
Towards proactive computer-system forensics
-
Bradford, P., Brown, M., Perdue, J., Self, B.: Towards proactive computer-system forensics. In: Proceedings of ITCC, pp. 648-652 (2004)
-
(2004)
Proceedings of ITCC
, pp. 648-652
-
-
Bradford, P.1
Brown, M.2
Perdue, J.3
Self, B.4
|