메뉴 건너뛰기




Volumn 1, Issue , 2009, Pages 258-261

An active defense model and framework of insider threats detection and sense

Author keywords

Detection; Insider threat; Model; Sense

Indexed keywords

ACTIVE DEFENSE; COMPUTATIONAL ENVIRONMENTS; DETECTION; INSIDER ATTACK; INSIDER THREAT; LEGITIMATE USERS;

EID: 74049154667     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAS.2009.315     Document Type: Conference Paper
Times cited : (15)

References (11)
  • 1
    • 27544447707 scopus 로고    scopus 로고
    • A. Iyer and H. Q. Ngo, Towards a theory of insider threat assessment, in In Proceedings of the 2005 International Conference on Dependable Systems and Networks Yokohama, Japan: IEEE Computer Society, 2005, pp. 108-117.
    • A. Iyer and H. Q. Ngo, "Towards a theory of insider threat assessment," in In Proceedings of the 2005 International Conference on Dependable Systems and Networks Yokohama, Japan: IEEE Computer Society, 2005, pp. 108-117.
  • 2
    • 21244441178 scopus 로고    scopus 로고
    • Barbarians inside the gates: Addressing internal security threats
    • M. Kemp, "Barbarians inside the gates: addressing internal security threats," Network Security, vol. 2005, pp. 11-13, 2005.
    • (2005) Network Security , vol.2005 , pp. 11-13
    • Kemp, M.1
  • 3
    • 34250649294 scopus 로고    scopus 로고
    • Danger of the insider threat
    • B. McKenna, "Danger of the insider threat," Infosecurity, vol. 4, pp. 5-5, 2007.
    • (2007) Infosecurity , vol.4 , pp. 5-5
    • McKenna, B.1
  • 4
    • 24644470542 scopus 로고    scopus 로고
    • The insider threat to information systems and the effectiveness of ISO17799
    • Marianthi, Spyros, Maria, and Evangelos, "The insider threat to information systems and the effectiveness of ISO17799," Computers & Security, vol. 24, pp. 472-484, 2005.
    • (2005) Computers & Security , vol.24 , pp. 472-484
    • Marianthi, S.1    Maria2    Evangelos3
  • 7
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • E. E. Schultz, "A framework for understanding and predicting insider attacks," Computers & Security, vol. 21, pp. 526-531, 2002.
    • (2002) Computers & Security , vol.21 , pp. 526-531
    • Schultz, E.E.1
  • 8
    • 33646031830 scopus 로고    scopus 로고
    • Using Attack Trees to Identify Malicious Attacks from Authorized Insiders
    • I. Ray and N. Poolsapassit, "Using Attack Trees to Identify Malicious Attacks from Authorized Insiders," in Computer Security - ESORICS 2005, 2005, pp. 231-246.
    • (2005) Computer Security - ESORICS 2005 , pp. 231-246
    • Ray, I.1    Poolsapassit, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.