메뉴 건너뛰기




Volumn , Issue , 2012, Pages 2422-2430

Managing malicious insider risk through BANDIT

Author keywords

Insider threat; Network behavioral analysis; Social network analysis

Indexed keywords

BEHAVIORAL RESEARCH; INTRUSION DETECTION; RISK ASSESSMENT; SECURITY OF DATA; SOCIAL NETWORKING (ONLINE);

EID: 84857941869     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2012.420     Document Type: Conference Paper
Times cited : (13)

References (12)
  • 1
    • 75149124684 scopus 로고    scopus 로고
    • Detecting insider theft of trade secrets
    • nov.-dec
    • D. Caputo, M. Maloof, and G. Stephens. Detecting insider theft of trade secrets. Security Privacy, IEEE, 7(6):14-21, nov.-dec. 2009.
    • (2009) Security Privacy IEEE , vol.7 , Issue.6 , pp. 14-21
    • Caputo, D.1    Maloof, M.2    Stephens, G.3
  • 3
    • 38349036494 scopus 로고    scopus 로고
    • Elicit : AAA system for detecting insiders who violate need-to-know
    • Christopher Kruegel, Richard Lippmann, and Andrew Clark, editors Lecture Notes in Computer Science. Springer Berlin / Heidelberg
    • Marcus Maloof and Gregory Stephens. Elicit : A system for detecting insiders who violate need-to-know. In Christopher Kruegel, Richard Lippmann, and Andrew Clark, editors, Recent Advances in Intrusion Detection, volume 4637 of Lecture Notes in Computer Science, pages 146-166. Springer Berlin / Heidelberg, 2007.
    • (2007) Recent Advances in Intrusion Detection , vol.4637 , pp. 146-166
    • Maloof, M.1    Stephens, G.2
  • 7
    • 84857982922 scopus 로고    scopus 로고
    • PhD Thesis: Cyber-based Behavioral Modeling. Thayer School of Engineering, Dartmouth College
    • David Robinson. PhD Thesis: Cyber-based Behavioral Modeling. Thayer School of Engineering, Dartmouth College, 2010.
    • (2010)
    • Robinson, D.1
  • 10
    • 84857982926 scopus 로고    scopus 로고
    • Ten tales of betrayal: The threat to corporate infrastructures by information technology insiders analysis and observations
    • Sep
    • E Shaw and L Fischer. Ten tales of betrayal: The threat to corporate infrastructures by information technology insiders analysis and observations. PERSEREC TR-05-13, Sep 2005.
    • (2005) PERSEREC TR-05-13
    • Shaw, E.1    Fischer, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.