메뉴 건너뛰기




Volumn 7, Issue 6, 2009, Pages 14-21

Detecting insider theft of trade secrets

Author keywords

Computer misuse; Computer security; Elicit; Exploit Latent Information to Counter Insider Threats; Insider threats; MITRE

Indexed keywords

COMPUTER MISUSE; COMPUTER SECURITY; INSIDER THREAT; LATENT INFORMATION; MALICIOUS INSIDERS; RESEARCH EFFORTS; RESEARCH PROTOTYPE; SENSITIVE INFORMATIONS; SOCIAL SCIENTISTS; TRADE SECRETS;

EID: 75149124684     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2009.110     Document Type: Article
Times cited : (49)

References (9)
  • 1
    • 75149138122 scopus 로고    scopus 로고
    • New ways needed to assess new economy
    • 13 Nov.
    • M.M. Blair, "New Ways Needed to Assess New Economy," Los Angeles Times, 13 Nov. 2000, p. B7.
    • (2000) Los Angeles Times
    • Blair, M.M.1
  • 2
    • 75149197559 scopus 로고    scopus 로고
    • Bureau of Justice Statistics Special Report Sept.
    • R.R. Rantala, Cybercrime against Businesses, 2005, Bureau of Justice Statistics Special Report, Sept. 2008; www.ojp.usdoj.gov/bjs/pub/pdf/cb05.pdf.
    • (2008) Cybercrime Against Businesses 2005
    • Rantala, R.R.1
  • 3
    • 38349036494 scopus 로고    scopus 로고
    • ELICIT: A system for detecting insiders who violate need-to-know
    • LNCS, Springer
    • M.A. Maloof and G.D. Stephens, "ELICIT: A System for Detecting Insiders Who Violate Need-to-Know," Recent Advances in Intrusion Detection, LNCS 4637, Springer, 2007, pp. 146-166.
    • (2007) Recent Advances in Intrusion Detection , vol.4637 , pp. 146-166
    • Maloof, M.A.1    Stephens, G.D.2
  • 4
    • 56549124499 scopus 로고    scopus 로고
    • An empirical approach to identify information misuse by insiders
    • LNCS, Springer
    • D.D. Caputo et al., "An Empirical Approach to Identify Information Misuse by Insiders," Recent Advances in Intrusion Detection, LNCS 5230, Springer, 2008, pp. 402-403.
    • (2008) Recent Advances in Intrusion Detection , vol.5230 , pp. 402-403
    • Caputo, D.D.1
  • 7
    • 38349076728 scopus 로고    scopus 로고
    • Analysis and detection of malicious insiders
    • MITRE
    • M. Maybury et al., "Analysis and Detection of Malicious Insiders," Proc. 2005 Int'l Conf. Intelligence Analysis, MITRE, 2005; https://analysis.mitre.org/proceedings/ Final-Papers-Files/280-Camera-Ready- Paper.pdf.
    • (2005) Proc. 2005 Int'l Conf. Intelligence Analysis
    • Maybury, M.1
  • 8
    • 84868057662 scopus 로고    scopus 로고
    • VA data loss could prompt federal privacy law
    • 5 June
    • G. Gross, "VA Data Loss Could Prompt Federal Privacy Law," Network World, 5 June. 2006; www.network world.com/news/2006/060506-va-data- loss-could -prompt.html.
    • (2006) Network World
    • Gross, G.1
  • 9
    • 67650380184 scopus 로고    scopus 로고
    • U.S. secret service and CERT/SEI insider threat study: Illicit cyber activity in the information technology and telecommunications sector
    • Software Engineering Inst., Carnegie Mellon Univ., Jan.
    • E. Kowalski, D. Cappelli, and A. Moore, "U.S. Secret Service and CERT/SEI Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector," US Secret Service and CERT Program, Software Engineering Inst., Carnegie Mellon Univ., Jan. 2008.
    • (2008) US Secret Service and CERT Program
    • Kowalski, E.1    Cappelli, D.2    Moore, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.