-
1
-
-
75149124684
-
Detecting insider theft of trade secrets
-
nov.-dec
-
D. Caputo, M. Maloof, and G. Stephens. Detecting insider theft of trade secrets. Security Privacy, IEEE, 7(6):14-21, nov.-dec. 2009.
-
(2009)
Security Privacy IEEE
, vol.7
, Issue.6
, pp. 14-21
-
-
Caputo, D.1
Maloof, M.2
Stephens, G.3
-
2
-
-
80052621067
-
Insiders and insider threats an overview of definitions and mitigation techniques
-
Jeffrey Hunker and Christian Probst. Insiders and insider threats an overview of definitions and mitigation techniques. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2(1), 2011.
-
(2011)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
, vol.2
, Issue.1
-
-
Hunker, J.1
Probst, C.2
-
3
-
-
38349036494
-
Elicit : AAA system for detecting insiders who violate need-to-know
-
Christopher Kruegel, Richard Lippmann, and Andrew Clark, editors Lecture Notes in Computer Science. Springer Berlin / Heidelberg
-
Marcus Maloof and Gregory Stephens. Elicit : A system for detecting insiders who violate need-to-know. In Christopher Kruegel, Richard Lippmann, and Andrew Clark, editors, Recent Advances in Intrusion Detection, volume 4637 of Lecture Notes in Computer Science, pages 146-166. Springer Berlin / Heidelberg, 2007.
-
(2007)
Recent Advances in Intrusion Detection
, vol.4637
, pp. 146-166
-
-
Maloof, M.1
Stephens, G.2
-
4
-
-
84857982924
-
Distributed security policy conformance
-
Nov
-
Mirko Montanari, Ellick Chan, Kevin Larson, Wucherl Yoo, and Roy H. Campbell. Distributed security policy conformance. In Proceedings of the 2010 CAE Workshop on Insider Threat, Nov 2010.
-
(2010)
Proceedings of the 2010 CAE Workshop on Insider Threat
-
-
Montanari, M.1
Chan, E.2
Larson, K.3
Yoo, W.4
Campbell, R.H.5
-
5
-
-
79957985323
-
Effectively identifying user profiles in network and host metrics
-
Apr
-
John Murphy, Vincent Berk, and Ian Gregorio-deSouza. Effectively identifying user profiles in network and host metrics. Proceedings of the 2010 SPIE Conference on Defense, Security, and Sensing, Apr 2010.
-
(2010)
Proceedings of the 2010 SPIE Conference on Defense, Security, and Sensing
-
-
Murphy, J.1
Berk, V.2
Gregorio-Desouza, I.3
-
6
-
-
77249177144
-
Insiders behaving badly: Addressing bad actors and their actions
-
march
-
S.L. Pfleeger, J.B. Predd, J. Hunker, and C. Bulford. Insiders behaving badly: Addressing bad actors and their actions. Information Forensics and Security, IEEE Transactions on, 5(1):169-179, march 2010.
-
(2010)
Information Forensics and Security IEEE Transactions on
, vol.5
, Issue.1
, pp. 169-179
-
-
Pfleeger, S.L.1
Predd, J.B.2
Hunker, J.3
Bulford, C.4
-
7
-
-
84857982922
-
-
PhD Thesis: Cyber-based Behavioral Modeling. Thayer School of Engineering, Dartmouth College
-
David Robinson. PhD Thesis: Cyber-based Behavioral Modeling. Thayer School of Engineering, Dartmouth College, 2010.
-
(2010)
-
-
Robinson, D.1
-
8
-
-
84900580930
-
Hbml: A language for quantitative behavioral modeling in the human terrain
-
Springer US
-
Nils F Sandell, Robert Savell, David Twardowski, and George Cybenko. Hbml: A language for quantitative behavioral modeling in the human terrain. In Social Computing and Behavioral Modeling, pages 1-10. Springer US, 2009.
-
(2009)
Social Computing and Behavioral Modeling
, pp. 1-10
-
-
Sandell, N.F.1
Savell, R.2
Twardowski, D.3
Cybenko, G.4
-
9
-
-
84857991408
-
Computational behavioral analysis for insider threat detection
-
Nov
-
Robert Savell, David Robinson, John Murphy, Ian Gregorio-de Souza, Vincent Berk, and George Cybenko. Computational behavioral analysis for insider threat detection. In Proceedings of the 2010 CAE Workshop on Insider Threat, Nov 2010.
-
(2010)
Proceedings of the 2010 CAE Workshop on Insider Threat
-
-
Savell, R.1
Robinson, D.2
Murphy, J.3
Gregorio-De Souza, I.4
Berk, V.5
Cybenko, G.6
-
10
-
-
84857982926
-
Ten tales of betrayal: The threat to corporate infrastructures by information technology insiders analysis and observations
-
Sep
-
E Shaw and L Fischer. Ten tales of betrayal: The threat to corporate infrastructures by information technology insiders analysis and observations. PERSEREC TR-05-13, Sep 2005.
-
(2005)
PERSEREC TR-05-13
-
-
Shaw, E.1
Fischer, L.2
|