-
1
-
-
27544447707
-
-
A. Iyer and H. Q. Ngo, Towards a theory of insider threat assessment, in In Proceedings of the 2005 International Conference on Dependable Systems and Networks Yokohama, Japan: IEEE Computer Society, 2005, pp. 108-117.
-
A. Iyer and H. Q. Ngo, "Towards a theory of insider threat assessment," in In Proceedings of the 2005 International Conference on Dependable Systems and Networks Yokohama, Japan: IEEE Computer Society, 2005, pp. 108-117.
-
-
-
-
2
-
-
21244441178
-
Barbarians inside the gates: Addressing internal security threats
-
M. Kemp, "Barbarians inside the gates: addressing internal security threats," Network Security, vol. 2005, pp. 11-13, 2005.
-
(2005)
Network Security
, vol.2005
, pp. 11-13
-
-
Kemp, M.1
-
3
-
-
34250649294
-
Danger of the insider threat
-
B. McKenna, "Danger of the insider threat," Infosecurity, vol. 4, pp. 5-5, 2007.
-
(2007)
Infosecurity
, vol.4
, pp. 5-5
-
-
McKenna, B.1
-
4
-
-
24644470542
-
The insider threat to information systems and the effectiveness of ISO17799
-
Marianthi, Spyros, Maria, and Evangelos, "The insider threat to information systems and the effectiveness of ISO17799," Computers & Security, vol. 24, pp. 472-484, 2005.
-
(2005)
Computers & Security
, vol.24
, pp. 472-484
-
-
Marianthi, S.1
Maria2
Evangelos3
-
7
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
E. E. Schultz, "A framework for understanding and predicting insider attacks," Computers & Security, vol. 21, pp. 526-531, 2002.
-
(2002)
Computers & Security
, vol.21
, pp. 526-531
-
-
Schultz, E.E.1
-
8
-
-
33646031830
-
Using Attack Trees to Identify Malicious Attacks from Authorized Insiders
-
I. Ray and N. Poolsapassit, "Using Attack Trees to Identify Malicious Attacks from Authorized Insiders," in Computer Security - ESORICS 2005, 2005, pp. 231-246.
-
(2005)
Computer Security - ESORICS 2005
, pp. 231-246
-
-
Ray, I.1
Poolsapassit, N.2
-
10
-
-
0034871635
-
Hierarchy-based access control in distributed environments
-
Helsinki IEEE Computer Society
-
J. C. Birget, X. Zou, G. Noubir, and B. Ramamurthy, "Hierarchy-based access control in distributed environments," in 2001 IEEE International Conference on Communications. vol. 1 Helsinki IEEE Computer Society, 2001, pp. 229-233.
-
(2001)
2001 IEEE International Conference on Communications
, vol.1
, pp. 229-233
-
-
Birget, J.C.1
Zou, X.2
Noubir, G.3
Ramamurthy, B.4
-
11
-
-
33745170386
-
Quantitative Hierarchical Threat Evaluation Model for Network Security
-
C. Xiu-Zhen, Z. Qing-Hua, GUAN Xiao-Hong, and L. Chen-Guang, "Quantitative Hierarchical Threat Evaluation Model for Network Security," Journal of Software, vol. 17, p. 885-897, 2006.
-
(2006)
Journal of Software
, vol.17
, pp. 885-897
-
-
Xiu-Zhen, C.1
Qing-Hua, Z.2
Xiao-Hong, G.U.A.N.3
Chen-Guang, L.4
|