-
1
-
-
24644470542
-
The insider threat to Information Systems and the effectiveness of ISO 17799
-
Theoharidou, M., Kokolakis, S., Karyda, M., Kiountouzis, E.: The insider threat to Information Systems and the effectiveness of ISO 17799. Computers & Security 24(6), 472-484 (2005)
-
(2005)
Computers & Security
, vol.24
, Issue.6
, pp. 472-484
-
-
Theoharidou, M.1
Kokolakis, S.2
Karyda, M.3
Kiountouzis, E.4
-
3
-
-
0010886652
-
The insider threat to information systems: The psychology of the dangerous insider
-
Shaw, E., Ruby, K., Post, J.: The insider threat to information systems: The psychology of the dangerous insider. Security Awareness Bulletin 2, 1-10 (1988)
-
(1988)
Security Awareness Bulletin
, vol.2
, pp. 1-10
-
-
Shaw, E.1
Ruby, K.2
Post, J.3
-
4
-
-
68249129760
-
-
UCB/EECS-2009-28. Univ. of California at Berkley, USA
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: Above the Clouds: A Berkeley View of Cloud Computing. UCB/EECS-2009-28. Univ. of California at Berkley, USA (2009)
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
5
-
-
80052770275
-
Exploitation of auctions for outsourcing security-critical projects
-
Kandias, M., Mylonas, A., Theoharidou, M., Gritzalis, D.: Exploitation of auctions for outsourcing security-critical projects. In: Proc. of the 16th IEEE Symposium on Computers and Communications (ISCC 2011), Greece (2011)
-
Proc. of the 16th IEEE Symposium on Computers and Communications (ISCC 2011), Greece (2011)
-
-
Kandias, M.1
Mylonas, A.2
Theoharidou, M.3
Gritzalis, D.4
-
7
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
Schultz, E.: A framework for understanding and predicting insider attacks. Computers & Security 21(6), 526-531 (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.1
-
12
-
-
0034226287
-
A Revised Taxonomy for Intrusion Detection Systems
-
Debar, H., Dacier, M., Wespi, A.: A Revised Taxonomy for Intrusion Detection Systems. Annales des Teecommunications 55(7-8), 361-378 (2000)
-
(2000)
Annales des Teecommunications
, vol.55
, Issue.7-8
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
13
-
-
84946410215
-
Detecting Insider Threats by Monitoring System Call Activity
-
Nguyen, N.T., Reiher, P.L., Kuenning, G.: Detecting Insider Threats by Monitoring System Call Activity. In: Proc. of the IEEE Workshop on Information Assurance, pp. 45-52 (2003)
-
(2003)
Proc. of the IEEE Workshop on Information Assurance
, pp. 45-52
-
-
Nguyen, N.T.1
Reiher, P.L.2
Kuenning, G.3
-
14
-
-
84882794354
-
A Survey of Insider Attack Detection Research
-
Salem, M., Hershkop, S., Stolfo, S.J.: A Survey of Insider Attack Detection Research. In: Insider Attack and Cyber Security, vol. 39, pp. 69-90 (2008)
-
(2008)
Insider Attack and Cyber Security
, vol.39
, pp. 69-90
-
-
Salem, M.1
Hershkop, S.2
Stolfo, S.J.3
-
15
-
-
0036173202
-
Insider Threat Prediction Tool: Evaluating the probability of IT misuse
-
Magklaras, G., Furnell, S.: Insider Threat Prediction Tool: Evaluating the probability of IT misuse. Computers & Security 21(1), 62-73 (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.1
Furnell, S.2
-
16
-
-
24344460927
-
A preliminary model of end user sophistication for insider threat prediction in it systems
-
Magklaras, G., Furnell, S.: A preliminary model of end user sophistication for insider threat prediction in it systems. Computers and Security 24, 371-380 (2005)
-
(2005)
Computers and Security
, vol.24
, pp. 371-380
-
-
Magklaras, G.1
Furnell, S.2
-
21
-
-
84885692728
-
Yet another intrusion detection system against insider attacks
-
Mun, H., Han, K., Yeun, C., Kim, K.: Yet another intrusion detection system against insider attacks. In: Proc. of the SCIS 2008 (2008)
-
(2008)
Proc. of the SCIS 2008
-
-
Mun, H.1
Han, K.2
Yeun, C.3
Kim, K.4
-
22
-
-
78049354490
-
An Insider Threat Prediction Model
-
Katsikas, S., Lopez, J., Soriano, M. (eds.) TrustBus 2010. Springer, Heidelberg
-
Kandias, M., Mylonas, A., Virvilis, N., Theoharidou, M., Gritzalis, D.: An Insider Threat Prediction Model. In: Katsikas, S., Lopez, J., Soriano, M. (eds.) TrustBus 2010. LNCS, vol. 6264, pp. 26-37. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6264
, pp. 26-37
-
-
Kandias, M.1
Mylonas, A.2
Virvilis, N.3
Theoharidou, M.4
Gritzalis, D.5
-
23
-
-
84885826007
-
Legal Issues in Grid and Cloud Computing
-
Stanoevska-Slabeva, K., Wozniak, T., Ristol, R. (eds.) Springer, Berlin
-
Parrilli, D.: Legal Issues in Grid and Cloud Computing. In: Stanoevska-Slabeva, K., Wozniak, T., Ristol, R. (eds.) Grid and Cloud Computing: A Business Perspective on Technology and Applications, pp. 97-118. Springer, Berlin (2010)
-
(2010)
Grid and Cloud Computing: A Business Perspective on Technology and Applications
, pp. 97-118
-
-
Parrilli, D.1
-
24
-
-
1142282727
-
(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions
-
Claessens, J., Preneel, B., Vandewalle, J. (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions. ACM Transactions on Internet Technology 3(1), 28-48 (2003)
-
(2003)
ACM Transactions on Internet Technology
, vol.3
, Issue.1
, pp. 28-48
-
-
Claessens, J.1
Preneel, B.2
Vandewalle, J.3
-
26
-
-
77949842100
-
-
O'Reilly Media, USA
-
Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice). O'Reilly Media, USA (2009)
-
(2009)
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
-
-
Mather, T.1
Kumaraswamy, S.2
Latif, S.3
-
27
-
-
84885705713
-
Towards an interdisciplinary information security education model
-
Gritzalis, D., Theoharidou, M., Kalimeri, E.: Towards an interdisciplinary information security education model. In: Proc. of the 4th World Conference on Information Security Education (WISE-4), Moscow (May 2005)
-
Proc. of the 4th World Conference on Information Security Education (WISE-4), Moscow (May 2005)
-
-
Gritzalis, D.1
Theoharidou, M.2
Kalimeri, E.3
-
28
-
-
0034446783
-
Evaluating certificate status information mechanisms
-
ACM Press October
-
Iliadis, J., Gritzalis, D., Spinellis, D., Preneel, B., Katsikas, S.: Evaluating certificate status information mechanisms. In: Proc. of the 7th ACM Computer and Communications Security Conference (CCS 2000), pp. 1-9. ACM Press (October 2000)
-
(2000)
Proc. of the 7th ACM Computer and Communications Security Conference (CCS 2000)
, pp. 1-9
-
-
Iliadis, J.1
Gritzalis, D.2
Spinellis, D.3
Preneel, B.4
Katsikas, S.5
-
29
-
-
80052493767
-
Smartphone Security Evaluation - The Malware Attack Case
-
July
-
Mylonas, A., Dritsas, S., Tsoumas, V., Gritzalis, D.: Smartphone Security Evaluation - The Malware Attack Case. In: Proc. of the 8th International Conference on Security and Cryptography (SECRYPT 2011), Spain, pp. 25-36 (July 2011)
-
(2011)
Proc. of the 8th International Conference on Security and Cryptography (SECRYPT 2011), Spain
, pp. 25-36
-
-
Mylonas, A.1
Dritsas, S.2
Tsoumas, V.3
Gritzalis, D.4
-
31
-
-
84885179321
-
Risk-Based Criticality Analysis
-
Palmer, C., Shenoi, S. (eds.) Critical Infrastructure Protection III. Springer, Heidelberg
-
Theoharidou, M., Kotzanikolaou, P., Gritzalis, D.: Risk-Based Criticality Analysis. In: Palmer, C., Shenoi, S. (eds.) Critical Infrastructure Protection III. IFIP AICT, vol. 311, pp. 35-49. Springer, Heidelberg (2009)
-
(2009)
IFIP AICT
, vol.311
, pp. 35-49
-
-
Theoharidou, M.1
Kotzanikolaou, P.2
Gritzalis, D.3
-
32
-
-
23444459747
-
Secure electronic voting: The current landscape
-
Gritzalis, D. (ed.) Kluwer, USA
-
Lambrinoudakis, C., Gritzalis, D., Tsoumas, V., Karyda, M., Ikonomopoulos, S.: Secure electronic voting: The current landscape. In: Gritzalis, D. (ed.) Secure Electronic Voting, pp. 110-122. Kluwer, USA (2003)
-
(2003)
Secure Electronic Voting
, pp. 110-122
-
-
Lambrinoudakis, C.1
Gritzalis, D.2
Tsoumas, V.3
Karyda, M.4
Ikonomopoulos, S.5
|