-
1
-
-
0003950444
-
-
S. Rayner and R. J. Riding, Eds. Westport, CT: Greenwood
-
R. J. Riding and S. Rayner, Cognitive Styles, S. Rayner and R. J. Riding, Eds. Westport, CT: Greenwood, 2000.
-
(2000)
Cognitive Styles
-
-
Riding, R.J.1
Rayner, S.2
-
2
-
-
62949105495
-
Intent-driven insider threat detection in intelligence analyses
-
Sydney, Australia
-
E. Santos, Jr., H. Nguyen, F. Yu, K. J. Kim, D. Li, J. T. Wilkinson, A. Olson, and R. Jacob, "Intent-driven insider threat detection in intelligence analyses," in Proc. IEEE/WIC/ACM Int. Conf. Web Intell. Intell. Agent Technol., Sydney, Australia, 2008, pp. 345-349.
-
(2008)
Proc. IEEE/WIC/ACM Int. Conf. Web Intell. Intell. Agent Technol.
, pp. 345-349
-
-
Santos Jr., E.1
Nguyen, H.2
Yu, F.3
Kim, K.J.4
Li, D.5
Wilkinson, J.T.6
Olson, A.7
Jacob, R.8
-
3
-
-
84882794354
-
A survey of insider attack detection research
-
NewYork: Springer- Verlag
-
M. B. Salem, S. Hershkop, and S. J. Stolfo, "A survey of insider attack detection research," in Insider Attack and Cyber Security. NewYork: Springer-Verlag, 2008, pp. 69-90.
-
(2008)
Insider Attack and Cyber Security
, pp. 69-90
-
-
Salem, M.B.1
Hershkop, S.2
Stolfo, S.J.3
-
4
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Aug.
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls," J. Comput. Security, vol. 6, no. 3, pp. 151-180, Aug. 1998.
-
(1998)
J. Comput. Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
5
-
-
33745463455
-
Learning classifiers for misuse and anomaly detection using a bag of system calls representation
-
DOI 10.1109/IAW.2005.1495942, 1495942, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
-
D.-K. Kang, D. Fuller, and V. Honavar, "Learning classifiers for misuse detection using a bag of system calls representation," in Proc. 6th Annu. IEEE SMC IAW, 2005, pp. 118-125. (Pubitemid 43948712)
-
(2005)
Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
, vol.2005
, pp. 118-125
-
-
Kang, D.-K.1
Fuller, D.2
Honavar, V.3
-
6
-
-
0029716418
-
A sense of self for Unix processes
-
Oakland, CA
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for Unix processes," in Proc. IEEE Symp. Security Privacy, Oakland, CA, 1996, pp. 120-128.
-
(1996)
Proc. IEEE Symp. Security Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
7
-
-
38149083999
-
Exploiting execution context for the detection of anomalous system calls
-
Gold Coast, Australia
-
D. Mutz, W. Robertson, G. Vigna, and R. Kemmerer, "Exploiting execution context for the detection of anomalous system calls," in Proc. Int. Symp. RAID, Gold Coast, Australia, 2007, pp. 1-20.
-
(2007)
Proc. Int. Symp. RAID
, pp. 1-20
-
-
Mutz, D.1
Robertson, W.2
Vigna, G.3
Kemmerer, R.4
-
8
-
-
38149092413
-
Understanding precision in host based intrusion detection
-
M. S. Sharif, K. Singh, J. Giffin, and W. Lee, "Understanding precision in host based intrusion detection," in Proc. Int. Symp. RAID, 2007, pp. 21-41.
-
(2007)
Proc. Int. Symp. RAID
, pp. 21-41
-
-
Sharif, M.S.1
Singh, K.2
Giffin, J.3
Lee, W.4
-
9
-
-
0028430224
-
Network intrusion detection
-
May/Jun.
-
B. Mukherjee, L. T. Heberlein, and K. N. Levitt, "Network intrusion detection," IEEE Netw., vol. 8, no. 3, pp. 26-41, May/Jun. 1994.
-
(1994)
IEEE Netw.
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
10
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
C. Ko, "Execution monitoring of security-critical programs in distributed systems: A specification-based approach," in Proc. IEEE Symp. Security Privacy, 1997, pp. 175-187.
-
(1997)
Proc. IEEE Symp. Security Privacy
, pp. 175-187
-
-
Ko, C.1
-
11
-
-
84946410215
-
Detecting insider threats by monitoring system call activity
-
N. Nguyen, P. Reiher, and G. H. Kuenning, "Detecting insider threats by monitoring system call activity," in Proc. IEEE Syst., Man Cybern. Soc. Inf. Assur. Workshop, 2003, pp. 45-52.
-
(2003)
Proc. IEEE Syst., Man Cybern. Soc. Inf. Assur. Workshop
, pp. 45-52
-
-
Nguyen, N.1
Reiher, P.2
Kuenning, G.H.3
-
12
-
-
33745477389
-
A comparison of system call feature representations for insider threat detection
-
DOI 10.1109/IAW.2005.1495972, 1495972, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
-
A. Liu, C. Martin, T. Hetherington, and S. Matzner, "A comparison of system call feature representations for insider threat detection," in Proc. 6th Annu. IEEE SMC IAW, 2005, pp. 340-347. (Pubitemid 43948742)
-
(2005)
Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
, vol.2005
, pp. 340-347
-
-
Liu, A.1
Martin, C.2
Hetherington, T.3
Matzner, S.4
-
13
-
-
33747175399
-
AI lessons learned from experiments in insider threat detection
-
What Went Wrong and Why: Lessons from AI Research and Applications - Papers from the AAAI Spring Symposium, Technical Report
-
A. Liu, C. Martin, T. Hetherington, and S. Matzner, "AI lessons learned from experiments in insider threat detection," in Proc. AAAI Spring Symp., 2006, pp. 49-55. (Pubitemid 44230661)
-
(2006)
AAAI Spring Symposium - Technical Report
, vol.SS-06-08
, pp. 49-55
-
-
Liu, A.1
Martin, C.2
Hetherington, T.3
Matzner, S.4
-
14
-
-
0142157009
-
On the detection of anomalous system call arguments
-
C. Kruegel, D. Mutz, F. Valeur, and G. Vigna, "On the detection of anomalous system call arguments," in Proc. ESORICS, 2003, pp. 326-343.
-
(2003)
Proc. ESORICS
, pp. 326-343
-
-
Kruegel, C.1
Mutz, D.2
Valeur, F.3
Vigna, G.4
-
15
-
-
0012282403
-
Computer Intrusion: Detecting Masquerades
-
DOI 10.1214/ss/998929476
-
M. Schonlau, W. DuMouchel, W.-H. Ju, and A. F. Karr, "Computer intrusion: Detecting masquerades," Stat. Sci., vol. 16, no. 1, pp. 58-74, Feb. 2001. (Pubitemid 33632847)
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.-H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
16
-
-
0036931591
-
Masquerade detection using truncated command lines
-
R. A. Maxion and T. N. Townsend, "Masquerade detection using truncated command lines," in Proc. Int. Conf. DSN, 2002, pp. 219-228.
-
(2002)
Proc. Int. Conf. DSN
, pp. 219-228
-
-
Maxion, R.A.1
Townsend, T.N.2
-
17
-
-
34748865459
-
Masquerade detection based on SVM and sequence-based user commands profile
-
DOI 10.1145/1229285.1229340, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
J. Seo and S. Cha, "Masquerade detection based on SVM and sequencebased user commands profile," in Proc. 2nd ACM Symp. Inf., Comput. Commun. Security, 2007, pp. 398-400. (Pubitemid 47479263)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 398-400
-
-
Seo, J.1
Cha, S.2
-
18
-
-
1542378274
-
Masquerade detection using enriched command lines
-
San Francisco, CA
-
R. A. Maxion, "Masquerade detection using enriched command lines," in Proc. Int. Conf. DSN, San Francisco, CA, 2003, pp. 5-14.
-
(2003)
Proc. Int. Conf. DSN
, pp. 5-14
-
-
Maxion, R.A.1
-
19
-
-
0013420742
-
-
Dept. Comput. Sci., Univ. Calgary, Calgary, AB, Canada, Tech. Rep. 88/333/45
-
S. Greenberg, "Using Unix: Collected traces of 168 users," Dept. Comput. Sci., Univ. Calgary, Calgary, AB, Canada, Tech. Rep. 88/333/45, 1988.
-
(1988)
Using Unix: Collected Traces of 168 Users
-
-
Greenberg, S.1
-
20
-
-
84857502039
-
An architecture for contextual insider threat detection
-
M. Kirkpatrick, E. Bertino, and F. Sheldon, "An architecture for contextual insider threat detection," cspurdueedu, 2009, pp. 1-11.
-
(2009)
Cspurdueedu
, pp. 1-11
-
-
Kirkpatrick, M.1
Bertino, E.2
Sheldon, F.3
-
21
-
-
18844379137
-
Display-only file server: A solution against information theft due to insider attack
-
Y. Yang and C. Tzi-cker, "Display-only file server: A solution against information theft due to insider attack," in Proc. ACM Workshop Digital Rights, 2004, pp. 31-39.
-
(2004)
Proc. ACM Workshop Digital Rights
, pp. 31-39
-
-
Yang, Y.1
Tzi-Cker, C.2
-
22
-
-
21644453410
-
Security policies to mitigate insider threat in the document control domain
-
P. Suranjan, S. Vidyaraman, and U. Shambhu, "Security policies to mitigate insider threat in the document control domain," in Proc. Comput. Security Appl. Conf., 2004, pp. 304-313.
-
(2004)
Proc. Comput. Security Appl. Conf.
, pp. 304-313
-
-
Suranjan, P.1
Vidyaraman, S.2
Shambhu, U.3
-
23
-
-
38349036494
-
ELICIT: A system for detecting insiders who violate need-to-know
-
M. Maloof and G. D. Stephens, "ELICIT: A system for detecting insiders who violate need-to-know," in Proc. Recent Adv. Intrusion Detection, 2007, pp. 146-166.
-
(2007)
Proc. Recent Adv. Intrusion Detection
, pp. 146-166
-
-
Maloof, M.1
Stephens, G.D.2
-
24
-
-
35048848603
-
Towards a social network approach for monitoring insider threats to information security
-
Tucson, AZ
-
A. Natarajan and L. Hossain, "Towards a social network approach for monitoring insider threats to information security," in Proc. 2nd NSF/NIJ Symp. Intell. Security Informat., Tucson, AZ, 2004, pp. 501-507.
-
(2004)
Proc. 2nd NSF/NIJ Symp. Intell. Security Informat.
, pp. 501-507
-
-
Natarajan, A.1
Hossain, L.2
-
25
-
-
35048892579
-
Semantic analysis for monitoring insider threats
-
Tucson, AZ
-
S. Symonenko, E. D. Liddy, O. Yilmazel, R. Del Zoppo, E. Brown, and M. Downey, "Semantic analysis for monitoring insider threats," in Proc. 2nd NSF/NIJ Symp. Intell. Security Informat., Tucson, AZ, 2004, pp. 492-500.
-
(2004)
Proc. 2nd NSF/NIJ Symp. Intell. Security Informat
, pp. 492-500
-
-
Symonenko, S.1
Liddy, E.D.2
Yilmazel, O.3
Del Zoppo, R.4
Brown, E.5
Downey, M.6
-
26
-
-
84857500663
-
Leveraging one-class SVM and semantic analysis to detect anomalous content
-
New York: Springer-Verlag
-
O. Yilmazel, S. Symonenko, N. Balasubramanian, and E. D. Liddy, "Leveraging one-class SVM and semantic analysis to detect anomalous content," in Terrorism Informatics. New York: Springer-Verlag, 2008, pp. 407-424.
-
(2008)
Terrorism Informatics
, pp. 407-424
-
-
Yilmazel, O.1
Symonenko, S.2
Balasubramanian, N.3
Liddy, E.D.4
-
27
-
-
33745931451
-
Composite role-based monitoring (CRBM) for countering insider threats
-
Tucson, AZ
-
J. S. Park and S. M. Ho, "Composite role-based monitoring (CRBM) for countering insider threats," in Proc. 2nd NSF/NIJ Symp. Intell. Security Informat., Tucson, AZ, 2004, pp. 201-213.
-
(2004)
Proc. 2nd NSF/NIJ Symp. Intell. Security Informat.
, pp. 201-213
-
-
Park, J.S.1
Ho, S.M.2
-
29
-
-
80052621067
-
Insiders and insider threats-An overview of definitions and mitigation techniques
-
J. Hunker and C. W. Probst, "Insiders and insider threats-An overview of definitions and mitigation techniques," J. Wireless Mobile Netw., Ubiquitous Comput., Dependable Appl., vol. 2, no. 1, pp. 4-27, 2011.
-
(2011)
J. Wireless Mobile Netw., Ubiquitous Comput., Dependable Appl.
, vol.2
, Issue.1
, pp. 4-27
-
-
Hunker, J.1
Probst, C.W.2
-
30
-
-
33847609906
-
Capturing user intent for information retrieval
-
New Orleans, LA
-
H. Nguyen, E. Santos, Jr., Q. Zhao, and H. Wang, "Capturing user intent for information retrieval," in Proc. 48th Annu. Meeting HFES, New Orleans, LA, 2004, pp. 371-375.
-
(2004)
Proc. 48th Annu. Meeting HFES
, pp. 371-375
-
-
Nguyen, H.1
Santos Jr., E.2
Zhao, Q.3
Wang, H.4
-
31
-
-
35648995677
-
Impacts of user modeling on personalization of information retrieval: An evaluation with human intelligence analysts
-
E. Santos, Jr., Q. Zhao, H. Nguyen, and H. Wang, "Impacts of user modeling on personalization of information retrieval: An evaluation with human intelligence analysts," in Proc. 4th Workshop Eval. Adapt. Syst., Conjunction With UM, 2005, pp. 27-36.
-
(2005)
Proc. 4th Workshop Eval. Adapt. Syst., Conjunction with UM
, pp. 27-36
-
-
Santos Jr., E.1
Zhao, Q.2
Nguyen, H.3
Wang, H.4
-
32
-
-
33847664064
-
-
Ph.D. dissertation, Univ. Connecticut, Storrs, CT
-
H. Nguyen, "Capturing user intent for information," Ph.D. dissertation, Univ. Connecticut, Storrs, CT, 2005.
-
(2005)
Capturing User Intent for Information
-
-
Nguyen, H.1
-
33
-
-
3543116624
-
User modelling for intent prediction in information analysis
-
E. Santos, Jr., H. Nguyen, Q. Zhao, and H. Wang, "User modelling for intent prediction in information analysis," in Proc. 47th Annu. Meeting Hum. Factors Ergonom. Soc., 2003, pp. 1034-1038.
-
(2003)
Proc. 47th Annu. Meeting Hum. Factors Ergonom. Soc.
, pp. 1034-1038
-
-
Santos Jr., E.1
Nguyen, H.2
Zhao, Q.3
Wang, H.4
-
34
-
-
85123319196
-
A robust parsing algorithm for link grammars
-
D. Grinberg, J. Lafferty, and D. Sleator, "A robust parsing algorithm for link grammars," in Proc. 4th Int. Workshop Parsing Technol., 1995, pp. 111-125.
-
(1995)
Proc. 4th Int. Workshop Parsing Technol.
, pp. 111-125
-
-
Grinberg, D.1
Lafferty, J.2
Sleator, D.3
-
36
-
-
84897585673
-
Comparison of conceptual graphs
-
M. Montes-y-Gómez, A. Gelbukh, and A. Lópes-López, "Comparison of conceptual graphs," in Proc. 1st MICAI, 2000, pp. 548-556.
-
(2000)
Proc. 1st MICAI
, pp. 548-556
-
-
Montes, Y.1
Gómez, M.2
Gelbukh, A.3
Lópes-López, A.4
-
38
-
-
24644478392
-
An insider threat model for adversary simulation
-
B. Wood, "An insider threat model for adversary simulation," in Proc. Res. Mitigating Insider Threat Inf. Syst., 2000, vol. 2, pp. 41-47.
-
(2000)
Proc. Res. Mitigating Insider Threat Inf. Syst.
, vol.2
, pp. 41-47
-
-
Wood, B.1
-
40
-
-
0014153614
-
Stability of cognitive style from childhood to young adulthood
-
Nov.
-
H. A. Witkin, D. R. Goodenough, and S. A. Karp, "Stability of cognitive style from childhood to young adulthood," J. Personality Social Psychol., vol. 7, no. 3, pp. 291-300, Nov. 1967.
-
(1967)
J. Personality Social Psychol.
, vol.7
, Issue.3
, pp. 291-300
-
-
Witkin, H.A.1
Goodenough, D.R.2
Karp, S.A.3
-
41
-
-
0001628502
-
Styles and strategies of learning
-
G. Pask, "Styles and strategies of learning," Brit. J. Educ. Psychol., vol. 46, no. II, pp. 128-148, 1976.
-
(1976)
Brit. J. Educ. Psychol.
, vol.46
, Issue.2
, pp. 128-148
-
-
Pask, G.1
-
42
-
-
84970382612
-
Fielddependent and field-independent cognitive styles and their educational implications
-
H. A. Witkin, C. A. Moore, D. R. Goodenough, and P. W. Cox, "Fielddependent and field-independent cognitive styles and their educational implications," Rev. Educ. Res., vol. 47, no. 1, pp. 1-64, 1977.
-
(1977)
Rev. Educ. Res.
, vol.47
, Issue.1
, pp. 1-64
-
-
Witkin, H.A.1
Moore, C.A.2
Goodenough, D.R.3
Cox, P.W.4
-
44
-
-
0041694642
-
Adaptors and innovators: A description and measure
-
Oct.
-
K. Michael, "Adaptors and innovators: A description and measure," J. Appl. Psychol., vol. 61, no. 5, pp. 622-629, Oct. 1976.
-
(1976)
J. Appl. Psychol.
, vol.61
, Issue.5
, pp. 622-629
-
-
Michael, K.1
-
45
-
-
70350035687
-
Researching the psychology of cognitive style and learning style: Is there really a future?
-
Dec.
-
E. R. Peterson, S. G. Rayner, and S. J. Armstrong, "Researching the psychology of cognitive style and learning style: Is there really a future?" Learning Individual Differences, vol. 19, no. 4, pp. 518-523, Dec. 2009.
-
(2009)
Learning Individual Differences
, vol.19
, Issue.4
, pp. 518-523
-
-
Peterson, E.R.1
Rayner, S.G.2
Armstrong, S.J.3
|