-
1
-
-
33747175399
-
AI lessons learned from experiments in insider threat detection
-
A. Liu, C. Martin, T. Hetherington, and S. Matzner, "AI lessons learned from experiments in insider threat detection, " in Proc. AAAI Spring Symp., 2006, pp. 49-55.
-
(2006)
Proc. AAAI Spring Symp.
, pp. 49-55
-
-
Liu, A.1
Martin, C.2
Hetherington, T.3
Matzner, S.4
-
2
-
-
20444471202
-
Statistical profiling and visualization for detection of malicious insider attacks on computer networks
-
J. B. Colombe and G. Stephens, "Statistical profiling and visualization for detection of malicious insider attacks on computer networks, " in Proc. ACM Workshop Visualization Data Mining Comput. Security, 2004, pp. 138-142.
-
(2004)
Proc. ACM Workshop Visualization Data Mining Comput. Security
, pp. 138-142
-
-
Colombe, J.B.1
Stephens, G.2
-
3
-
-
33745477389
-
A comparison of system call feature representations for insider threat detection
-
A. Liu, C. Martin, T. Hetherington, and S. Matzner, "A comparison of system call feature representations for insider threat detection, " in Proc. IEEE Workshop Inf. Assurance, 2005, pp. 340-347.
-
(2005)
Proc. IEEE Workshop Inf. Assurance
, pp. 340-347
-
-
Liu, A.1
Martin, C.2
Hetherington, T.3
Matzner, S.4
-
4
-
-
16644384919
-
Incentive-based modeling and inference of attacker intent, objectives, and strategies
-
Feb
-
P. Liu, W. Zang, and M. Yu, "Incentive-based modeling and inference of attacker intent, objectives, and strategies, " ACM Trans. Inf. Syst. Secur., vol. 8, no. 1, pp. 78-118, Feb. 2005.
-
(2005)
ACM Trans. Inf. Syst. Secur.
, vol.8
, Issue.1
, pp. 78-118
-
-
Liu, P.1
Zang, W.2
Yu, M.3
-
5
-
-
0037328484
-
Sustaining availability of web services under distributed denial of service attacks
-
Feb
-
J. Xu and W. Lee, "Sustaining availability of web services under distributed denial of service attacks, " IEEE Trans. Comput., vol. 52, no. 2, pp. 195-208, Feb. 2003.
-
(2003)
IEEE Trans. Comput.
, vol.52
, Issue.2
, pp. 195-208
-
-
Xu, J.1
Lee, W.2
-
6
-
-
0038223766
-
Using information security as a response to competitor analysis systems
-
Sep
-
L. A. Gordon and M. P. Loeb, "Using information security as a response to competitor analysis systems, " Commun. ACM, vol. 44, no. 9, pp. 70-75, Sep. 2001.
-
(2001)
Commun. ACM
, vol.44
, Issue.9
, pp. 70-75
-
-
Gordon, L.A.1
Loeb, M.P.2
-
8
-
-
33947628137
-
Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks
-
May
-
W. Yu and K. J. R. Liu, "Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks, " IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 459-473, May 2007.
-
(2007)
IEEE Trans. Mobile Comput.
, vol.6
, Issue.5
, pp. 459-473
-
-
Yu, W.1
Liu, K.J.R.2
-
9
-
-
14344257107
-
A game theoretic analysis of intrusion detection in access control systems
-
T. Alpcan and T. Basar, "A game theoretic analysis of intrusion detection in access control systems, " in Proc. 43rd IEEE Conf. Decision Control, 2004, pp. 1568-1573.
-
(2004)
Proc. 43rd IEEE Conf. Decision Control
, pp. 1568-1573
-
-
Alpcan, T.1
Basar, T.2
-
10
-
-
60649107168
-
A Bayesian game approach for intrusion detection in wireless ad hoc networks
-
Article
-
Y. Liu, C. Comaniciu, and H. Man, "A Bayesian game approach for intrusion detection in wireless ad hoc networks, " in Proc. Workshop Game Theory Commun. Netw., 2006, Article No. 4.
-
(2006)
Proc. Workshop Game Theory Commun. Netw.
, Issue.4
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
12
-
-
33745599368
-
Distributed privacy preserving information sharing
-
N. Zhang and W. Zhao, "Distributed privacy preserving information sharing, " in Proc. VLDB, 2005, pp. 889-900.
-
(2005)
Proc. VLDB
, pp. 889-900
-
-
Zhang, N.1
Zhao, W.2
-
14
-
-
0000572547
-
Reputation and equilibrium selection in games with a patient player
-
D. Fudenberg and D. K. Levine, "Reputation and equilibrium selection in games with a patient player, " Econometrica, vol. 57, no. 4, pp. 759-778, 1989.
-
(1989)
Econometrica
, vol.57
, Issue.4
, pp. 759-778
-
-
Fudenberg, D.1
Levine, D.K.2
-
15
-
-
84868907353
-
-
Dept. Comput. Sci., George Washington Univ., Washington, DC, Tech. Rep. TR-GWU-CS-09-002
-
N. Zhang, W. Yu, X. Fu, and S. K. Das, "On the establishment of defender's reputation against insider attacks, " Dept. Comput. Sci., George Washington Univ., Washington, DC, Tech. Rep. TR-GWU-CS-09-002, 2009.
-
(2009)
On the Establishment of Defender's Reputation Against Insider Attacks
-
-
Zhang, N.1
Yu, W.2
Fu, X.3
Das, S.K.4
-
16
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
H. Kim and B. Karp, "Autograph: Toward automated, distributed worm signature detection, " in Proc. USENIX SECURITY, 2004, pp. 271-286.
-
(2004)
Proc. USENIX SECURITY
, pp. 271-286
-
-
Kim, H.1
Karp, B.2
-
17
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
A. Lakhina, M. Crovella, and C. Diot, "Diagnosing network-wide traffic anomalies, " in Proc. SIGCOMM, 2004, pp. 219-230.
-
(2004)
Proc. SIGCOMM
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
18
-
-
0033281215
-
The base-rate fallacy and its implications for the difficulty of intrusion detection
-
S. Axelsson, "The base-rate fallacy and its implications for the difficulty of intrusion detection, " in Proc. CCS, 1999, pp. 1-7.
-
(1999)
Proc. CCS
, pp. 1-7
-
-
Axelsson, S.1
-
21
-
-
27544447707
-
Towards a theory of insider threat assessment
-
R. Chinchani, A. Iyer, H. Q. Ngo, and S. Upadhyaya, "Towards a theory of insider threat assessment, " in Proc. DSN, 2005, pp. 108-117.
-
(2005)
Proc. DSN
, pp. 108-117
-
-
Chinchani, R.1
Iyer, A.2
Ngo, H.Q.3
Upadhyaya, S.4
-
22
-
-
10044278199
-
Weak models for insider threat detection
-
P. Thompson, "Weak models for insider threat detection, " Proc. SPIE, pp. 40-48, 2004.
-
(2004)
Proc. SPIE
, pp. 40-48
-
-
Thompson, P.1
-
23
-
-
84944727480
-
Honeypots: Catching the insider threat
-
L. Spitzner, "Honeypots: Catching the insider threat, " in Proc. ACSAC, 2003, pp. 170-179.
-
(2003)
Proc. ACSAC
, pp. 170-179
-
-
Spitzner, L.1
-
24
-
-
21644453410
-
Security policies to mitigate insider threat in the document control domain
-
S. Pramanik, V. Sankaranarayanan, and S. Upadhyaya, "Security policies to mitigate insider threat in the document control domain, " in Proc. ACSAC, 2004, pp. 304-313.
-
(2004)
Proc. ACSAC
, pp. 304-313
-
-
Pramanik, S.1
Sankaranarayanan, V.2
Upadhyaya, S.3
-
25
-
-
24144437206
-
How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
-
P. Ning and K. Sun, "How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols, " Ad Hoc Netw., vol. 3, no. 6, pp. 795-819, 2005.
-
(2005)
Ad Hoc Netw.
, vol.3
, Issue.6
, pp. 795-819
-
-
Ning, P.1
Sun, K.2
-
26
-
-
33846303234
-
Detecting intraenterprise scanning worms based on address resolution
-
D. Whyte, P. C. Van Oorschot, and E. Kranakis, "Detecting intraenterprise scanning worms based on address resolution, " in Proc. ACSAC, 2005, pp. 371-380.
-
(2005)
Proc. ACSAC
, pp. 371-380
-
-
Whyte, D.1
Van Oorschot, P.C.2
Kranakis, E.3
-
27
-
-
14844293542
-
Game strategies in network security
-
K. Lye and J. M. Wing, "Game strategies in network security, " Int. J. Inf. Secur., vol. 4, no. 1/2, pp. 71-86, 2005.
-
(2005)
Int. J. Inf. Secur.
, vol.4
, Issue.1-2
, pp. 71-86
-
-
Lye, K.1
Wing, J.M.2
-
28
-
-
1642281565
-
-
M. S. thesis, Airforce Inst. Technol., Wright-Patterson AFB, OH
-
D. Buike, "Towards a game theory model of information warfare, " M. S. thesis, Airforce Inst. Technol., Wright-Patterson AFB, OH, 1999.
-
(1999)
Towards a Game Theory Model of Information Warfare
-
-
Buike, D.1
-
30
-
-
3142738238
-
PeerTrust: Supporting reputation-based trust in peer-to-peer communities
-
Jul
-
L. Xiong and L. Liu, "PeerTrust: Supporting reputation-based trust in peer-to-peer communities, " IEEE Trans. Knowl. Data Eng., vol. 16, no. 7, pp. 443-459, Jul. 2004.
-
(2004)
IEEE Trans. Knowl. Data Eng.
, vol.16
, Issue.7
, pp. 443-459
-
-
Xiong, L.1
Liu, L.2
-
31
-
-
14844315770
-
Reputation-based framework for high integrity sensor networks
-
S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks, " in Proc. SASN, 2004, pp. 66-77.
-
(2004)
Proc. SASN
, pp. 66-77
-
-
Ganeriwal, S.1
Srivastava, M.B.2
-
32
-
-
0000732722
-
Reputation in the simultaneous play of multiple opponents
-
Oct
-
D. Fudenberg and D. M. Kreps, "Reputation in the simultaneous play of multiple opponents, " Rev. Econ. Stud., vol. 54, no. 4, pp. 541-568, Oct. 1987.
-
(1987)
Rev. Econ. Stud.
, vol.54
, Issue.4
, pp. 541-568
-
-
Fudenberg, D.1
Kreps, D.M.2
|