메뉴 건너뛰기




Volumn 8134 LNCS, Issue , 2013, Pages 273-290

Managing the weakest link: A game-theoretic approach for the mitigation of insider threats

Author keywords

Access Control; Computer Security; Cyberespionage; Game Theory; Insider Threats

Indexed keywords

CYBERESPIONAGE; GAME-THEORETIC; INSIDER THREAT; NON-ZERO PROBABILITY; PROJECT MANAGERS; STOCHASTIC GAME; TEAM COMPOSITION; WEAKEST LINKS;

EID: 84884766446     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-40203-6_16     Document Type: Conference Paper
Times cited : (5)

References (19)
  • 4
    • 0035582316 scopus 로고    scopus 로고
    • Assessing knowledge assets: A review of the models used to measure intellectual capital
    • Bontis, N.: Assessing knowledge assets: A review of the models used to measure intellectual capital. International Journal of Management Reviews 3(1), 41-60 (2001)
    • (2001) International Journal of Management Reviews , vol.3 , Issue.1 , pp. 41-60
    • Bontis, N.1
  • 5
    • 77956652072 scopus 로고    scopus 로고
    • Human factors in information security: The insider threat - Who can you trust these days?
    • Colwill, C.: Human factors in information security: The insider threat - Who can you trust these days? Information Security Technical Report 14(4), 186-196 (2009)
    • (2009) Information Security Technical Report , vol.14 , Issue.4 , pp. 186-196
    • Colwill, C.1
  • 7
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • D'Arcy, J., Hovav, A., Galletta, D.: User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research 20(1), 79-98 (2009)
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.3
  • 8
    • 84885679339 scopus 로고    scopus 로고
    • FBI. The insider threat (April 2013), http://www.fbi.gov/about-us/ investigate/counterintelligence/insider-threat-brochure
    • (2013) The Insider Threat April
  • 9
    • 84885683402 scopus 로고    scopus 로고
    • Federal Bureau of Investigation. Economic espionage, http://www.fbi.gov/ about-us/investigate/counterintelligence/economic-espionage
    • Economic Espionage
  • 11
    • 84869417796 scopus 로고    scopus 로고
    • Where to hide the bits?
    • Grossklags, J., Walrand, J. (eds.) GameSec 2012 Springer, Heidelberg
    • Johnson, B., Schöttle, P., Böhme, R.: Where to hide the bits? In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 1-17. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7638 , pp. 1-17
    • Johnson, B.1    Schöttle, P.2    Böhme, R.3
  • 14
    • 84857929348 scopus 로고    scopus 로고
    • Insider threat behavior factors: A comparison of theory with reported incidents
    • Munshi, A., Dell, P., Armstrong, H.: Insider threat behavior factors: A comparison of theory with reported incidents. In: IEEE HICSS 2012, pp. 2402-2411 (2012)
    • (2012) IEEE HICSS 2012 , pp. 2402-2411
    • Munshi, A.1    Dell, P.2    Armstrong, H.3
  • 15
    • 0000238336 scopus 로고
    • A simplex method for function minimization
    • Nelder, J., Mead, R.: A simplex method for function minimization. Computer Journal 7, 308-313 (1965)
    • (1965) Computer Journal , vol.7 , pp. 308-313
    • Nelder, J.1    Mead, R.2
  • 18
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proceedings of the IEEE 63(9), 1278-1308 (1975)
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.