메뉴 건너뛰기




Volumn 7, Issue 6, 2009, Pages 30-38

Building a system for insider security

Author keywords

And visualization; Applications; Computing methodologies.; Insider security; Insider security systems; Insider threat; Model development; Modeling; Modeling methodologies; Simulation; System dynamics modeling

Indexed keywords

COMPUTING METHODOLOGIES; INSIDER THREAT; MODEL DEVELOPMENT; MODELING METHODOLOGY; SIMULATION SYSTEMS; VISUALIZATION APPLICATION;

EID: 75149188648     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2009.111     Document Type: Article
Times cited : (21)

References (14)
  • 4
    • 75149183007 scopus 로고    scopus 로고
    • Tech. report CMU/SEI- 2006-TR-026, ESC-TR-2006-2091, Software Eng. Inst., Carnegie Mellon Univ., Dec.
    • S.R. Band et al., Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis, tech. report CMU/SEI- 2006-TR-026, ESC-TR-2006-2091, Software Eng. Inst., Carnegie Mellon Univ., Dec. 2006.
    • (2006) Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis
    • B, S.R.1
  • 5
    • 43149116934 scopus 로고    scopus 로고
    • Preliminary system dynamics maps of the insider cyber-threat problem
    • the System Dynamics Soc.
    • D. Andersen et al., "Preliminary System Dynamics Maps of the Insider Cyber-Threat Problem, Proc. 22nd Int'l Conf. System Dynamics Soc., the System Dynamics Soc., 2004; www.systemdynamics.org/conferences/ 2004/SDS-2004/PAPERS/ 186GONZA.pdf.
    • (2004) Proc. 22nd Int'l Conf. System Dynamics Soc.
    • Andersen, D.1
  • 8
    • 75149126581 scopus 로고    scopus 로고
    • Network security threats and answers, by industry
    • 15 Jan.
    • M. Gregg, "Network Security Threats and Answers, By Industry," Search Networking, 15 Jan. 2007; http://search networking.techtarget.com/ generic/0,295582,sid7-gci1238902,00.html.
    • (2007) Search Networking
    • Gregg, M.1
  • 10
    • 49049121156 scopus 로고    scopus 로고
    • Simulating insider cyber-threat risks: A model-based case and a case-based model
    • the System Dynamics Soc.
    • E. Rich et al., "Simulating Insider Cyber-Threat Risks: A Model-Based Case and a Case-Based Model," Proc. 23th Int'l Conf. System Dynamics Soc., the System Dynamics Soc., 2005; www.systemdynamics.org/ conferences/2005/proceed/papers/RICH343.pdf.
    • (2005) Proc. 23th Int'l Conf. System Dynamics Soc.
    • Rich, E.1
  • 11
    • 43149107471 scopus 로고    scopus 로고
    • A behavioral theory of insider-threat risks: A system dynamics approach
    • Apr.
    • I.J. Martinez-Moyano et al., "A Behavioral Theory of Insider-Threat Risks: A System Dynamics Approach," ACM Trans. Modeling and Computer Simulation, vol.18, Apr. 2008, pp. 1-36.
    • (2008) ACM Trans. Modeling and Computer Simulation , vol.18 , pp. 1-36
    • Martinez-Moyano, I.J.1
  • 13
    • 75149189367 scopus 로고    scopus 로고
    • Insider analysis
    • SAND2006-1987C, Sandia Nat'l Laboratories, module 23
    • "Insider Analysis," The 19th Int'l Training Course, SAND2006-1987C, Sandia Nat'l Laboratories, 2006, module 23, pp. 214-287.
    • (2006) The 19th Int'l Training Course , pp. 214-287


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.