-
6
-
-
84890939088
-
-
BBC News
-
BBC News, "Profile: Edward Snowden, " 2013, http://www.bbc.co.uk/news/world-us-canada-22837100.
-
(2013)
Profile: Edward Snowden
-
-
-
7
-
-
33646132084
-
Research on Mitigating the Insider Threat to Information Systems
-
in, August
-
R. Anderson, T. Bozek, T. Longstaff, W. Meitzler, M. Skroch, and K. Van Wyk, "Research on Mitigating the Insider Threat to Information Systems, " in Proceedings of the Insider Workshop, August 2000.
-
(2000)
Proceedings of the Insider Workshop
-
-
Anderson, R.1
Bozek, T.2
Longstaff, T.3
Meitzler, W.4
Skroch, M.5
van Wyk, K.6
-
8
-
-
38949103680
-
Combating the Insider Cyber Threat
-
F. L. Greitzer, A. P. Moore, D. M. Cappelli, D. H. Andrews, L. A. Carroll, and T. D. Hull, "Combating the Insider Cyber Threat, " IEEE Security & Privacy, vol. 6, no. 1, pp. 61-64, 2007.
-
(2007)
IEEE Security & Privacy
, vol.6
, Issue.1
, pp. 61-64
-
-
Greitzer, F.L.1
Moore, A.P.2
Cappelli, D.M.3
Andrews, D.H.4
Carroll, L.A.5
Hull, T.D.6
-
9
-
-
84870830353
-
-
1st ed. Addison-Wesley Professional
-
D. M. Cappelli, A. P. Moore, and R. F. Trzeciak, The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes, 1st ed. Addison-Wesley Professional, 2012.
-
(2012)
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
-
-
Cappelli, D.M.1
Moore, A.P.2
Trzeciak, R.F.3
-
10
-
-
84944727480
-
Honeypots: Catching the insider threat
-
in, December, Las Vegas, Nevada, USA
-
L. Spitzner, "Honeypots: catching the insider threat, " in Proc. of the 19th IEEE Annual Computer Security Applications Conference (ACSAC'03), Las Vegas, Nevada, USA, December 2003, pp. 170-179.
-
(2003)
Proc. of the 19th IEEE Annual Computer Security Applications Conference (ACSAC'03)
, pp. 170-179
-
-
Spitzner, L.1
-
11
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
[Online]. Available
-
E. E. Schultz, "A framework for understanding and predicting insider attacks, " Computers and Security, vol. 21, no. 6, pp. 526-531, 2002. [Online]. Available: http://www.sciencedirect.com/science/article/pii/ S016740480201009X
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
13
-
-
0036173202
-
Insider Threat Prediction Tool: Evaluating the probability of IT misuse
-
G. B. Magklaras and S. M. Furnell, "Insider Threat Prediction Tool: Evaluating the probability of IT misuse, " Computers and Security, vol. 21, no. 1, pp. 62-73, 2002.
-
(2002)
Computers and Security
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
14
-
-
33646134102
-
Developing an Insider Threat Model Using Functional Decomposition
-
in, Springer-Verlag, September, St. Petersburg, Russia, LNCS
-
J. Butts, R. Mills, and R. Baldwin, "Developing an Insider Threat Model Using Functional Decomposition, " in Proc. of the 3rd International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS'05), St. Petersburg, Russia, LNCS, vol. 3685. Springer-Verlag, September 2005, pp. 412-417.
-
(2005)
Proc. of the 3rd International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS'05)
, vol.3685
, pp. 412-417
-
-
Butts, J.1
Mills, R.2
Baldwin, R.3
-
15
-
-
38349076728
-
Analysis and Detection of Malicious Insiders
-
in, MITRE, May, McLean, Viginia, USA
-
M. Maybury, P. Chase, B. Cheikes, D. Brackney, S. Matzner, T. Hetherington, B. Wood, C. Sibley, J. Marin, T. Longstaff, L. Spitzner, J. Haile, J. Copeland, and S. Lewandowski, "Analysis and Detection of Malicious Insiders, " in Proc. of the 2005 International Conference on Intelligence Analysis, McLean, Viginia, USA. MITRE, May 2005.
-
(2005)
Proc. of the 2005 International Conference on Intelligence Analysis
-
-
Maybury, M.1
Chase, P.2
Cheikes, B.3
Brackney, D.4
Matzner, S.5
Hetherington, T.6
Wood, B.7
Sibley, C.8
Marin, J.9
Longstaff, T.10
Spitzner, L.11
Haile, J.12
Copeland, J.13
Lewandowski, S.14
-
16
-
-
48749115606
-
A Knowledge-Base Model for Insider Threat Prediction
-
in, IEEE, June, West Point, New York, USA
-
Q. Althebyan and B. Panda, "A Knowledge-Base Model for Insider Threat Prediction, " in Proc. of the 2007 IEEE Information Assurance and Security Workshop (IAW'07), West Point, New York, USA. IEEE, June 2007, pp. 239-246.
-
(2007)
Proc. of the 2007 IEEE Information Assurance and Security Workshop (IAW'07)
, pp. 239-246
-
-
Althebyan, Q.1
Panda, B.2
-
17
-
-
79955702178
-
A framework of defense system for prevention of insider's malicious behaviors
-
in, IEEE, February, Phoenix Park, Gangwon-Do, Korea
-
J. Eom, M. Park, S. Park, and T. Chung, "A framework of defense system for prevention of insider's malicious behaviors, " in Proc. of the 13th International Conference on Advanced Communication Technology (ICAT'11), Phoenix Park, Gangwon-Do, Korea. IEEE, February 2011, pp. 982-987.
-
(2011)
Proc. of the 13th International Conference on Advanced Communication Technology (ICAT'11)
, pp. 982-987
-
-
Eom, J.1
Park, M.2
Park, S.3
Chung, T.4
-
18
-
-
84862842467
-
Advanced framework of defense system for prevetion of insider's malicious behaviors
-
in, April, Chennai, Tamil Nadu, India
-
C. Nithiyanandam, D. Tamilselvan, S. Balaji, and V. Sivaguru, "Advanced framework of defense system for prevetion of insider's malicious behaviors, " in Proc. of the 2012 International Conference on Recent Trends In Information Technology (ICRTIT'12), Chennai, Tamil Nadu, India, April 2012, pp. 434-438.
-
(2012)
Proc. of the 2012 International Conference on Recent Trends In Information Technology (ICRTIT'12)
, pp. 434-438
-
-
Nithiyanandam, C.1
Tamilselvan, D.2
Balaji, S.3
Sivaguru, V.4
-
19
-
-
46149087323
-
Modeling the Emergence of Insider Threat Vulnerabilities
-
in, IEEE, December, Monterey, California, USA
-
I. J. Martinez-Moyano, S. H. Conrad, E. H. Rich, and D. F. Andersen, "Modeling the Emergence of Insider Threat Vulnerabilities, " in Proc. of the 38th Conference on Winter Simulation (WSC'06), Monterey, California, USA. IEEE, December 2006, pp. 562-568.
-
(2006)
Proc. of the 38th Conference on Winter Simulation (WSC'06)
, pp. 562-568
-
-
Martinez-Moyano, I.J.1
Conrad, S.H.2
Rich, E.H.3
Andersen, D.F.4
-
20
-
-
77950556924
-
We have met the enemy and he is us
-
in, ACM, September, Lake Tahoe, California, USA
-
M. Bishop, S. Engle, S. Peisert, S. Whalen, and C. Gates, "We have met the enemy and he is us, " in Proc. of the 2008Workshop on New Security Paradigms (NSPW'08), Lake Tahoe, California, USA. ACM, September 2008, pp. 1-12.
-
(2008)
Proc. of the 2008Workshop on New Security Paradigms (NSPW'08)
, pp. 1-12
-
-
Bishop, M.1
Engle, S.2
Peisert, S.3
Whalen, S.4
Gates, C.5
-
21
-
-
63349109439
-
Case studies of an insider framework
-
in, IEEE, January, Waikoloa, Big Island, Hawaii, USA
-
M. Bishop, S. Engle, S. Peisert, S. Whalen, and C. Gates, "Case studies of an insider framework, " in Proc. of the 42nd Hawaii International Conference on System Sciences (HICSS'09), Waikoloa, Big Island, Hawaii, USA. IEEE, January 2009, pp. 1-10.
-
(2009)
Proc. of the 42nd Hawaii International Conference on System Sciences (HICSS'09)
, pp. 1-10
-
-
Bishop, M.1
Engle, S.2
Peisert, S.3
Whalen, S.4
Gates, C.5
-
22
-
-
70350070573
-
Developing insider attack detection model: A grounded approach
-
in, IEEE, June, Dallas, Texas, USA
-
G. Doss and G. Tejay, "Developing insider attack detection model: a grounded approach, " in Proc. of the 2009 IEEE International Conference on Intelligence and Security Informatics (ISI'09), Dallas, Texas, USA. IEEE, June 2009, pp. 107-112.
-
(2009)
Proc. of the 2009 IEEE International Conference on Intelligence and Security Informatics (ISI'09)
, pp. 107-112
-
-
Doss, G.1
Tejay, G.2
-
23
-
-
77249177144
-
Insiders behaving badly: Addressing bad actors and their actions
-
S. L. Pfleeger, J. B. Predd, J. Hunker, and C. Bulford, "Insiders behaving badly: Addressing bad actors and their actions, " IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 169-179, 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.1
, pp. 169-179
-
-
Pfleeger, S.L.1
Predd, J.B.2
Hunker, J.3
Bulford, C.4
-
24
-
-
79958717729
-
A framework for human factors in information security
-
in, October, Rio De Janeiro, Brazil
-
J. Gonzalez and A. Sawicka, "A framework for human factors in information security, " in Proc. of the 2002 WSEAS International Conference on Information Security, Hardware/Software Codesign, E-Commerce and Computer Networks, Rio De Janeiro, Brazil, October 2002, pp. 1871-1877.
-
(2002)
Proc. of the 2002 WSEAS International Conference on Information Security, Hardware/Software Codesign, E-Commerce and Computer Networks
, pp. 1871-1877
-
-
Gonzalez, J.1
Sawicka, A.2
-
25
-
-
33644904044
-
The role of behavioral research and profiling in malicious cyber insider investigations
-
E. D. Shaw, "The role of behavioral research and profiling in malicious cyber insider investigations, " Digital Investigation, vol. 3, no. 1, pp. 20-31, 2006.
-
(2006)
Digital Investigation
, vol.3
, Issue.1
, pp. 20-31
-
-
Shaw, E.D.1
-
26
-
-
77956652072
-
Human factors in information security: The insider threat-Who can you trust these days?
-
C. Colwill, "Human factors in information security: The insider threat-Who can you trust these days?" Information Security Technical Report, vol. 14, no. 4, pp. 186-196, 2009.
-
(2009)
Information Security Technical Report
, vol.14
, Issue.4
, pp. 186-196
-
-
Colwill, C.1
-
27
-
-
84857963677
-
Modeling Human Behavior to Anticipate Insider Attacks
-
F. L. Greitzer and R. E. Hohimer, "Modeling Human Behavior to Anticipate Insider Attacks, " Journal of Strategic Security, vol. 4, no. 2, pp. 25-48, 2011.
-
(2011)
Journal of Strategic Security
, vol.4
, Issue.2
, pp. 25-48
-
-
Greitzer, F.L.1
Hohimer, R.E.2
-
28
-
-
78049354490
-
An insider threat prediction model
-
in, Springer-Verlag, August, Bilbao, Spain, LNCS
-
M. Kandias, A. Mylonas, N. Virvilis, M. Theoharidou, and D. Gritzalis, "An insider threat prediction model, " in Proc. of the 7th international conference on Trust, Privacy and Security in Digital Business (TrustBus'10), Bilbao, Spain, LNCS, vol. 6264. Springer-Verlag, August 2010, pp. 26-37.
-
(2010)
Proc. of the 7th international conference on Trust, Privacy and Security in Digital Business (TrustBus'10)
, vol.6264
, pp. 26-37
-
-
Kandias, M.1
Mylonas, A.2
Virvilis, N.3
Theoharidou, M.4
Gritzalis, D.5
-
29
-
-
84864245980
-
Proactive insider threat detection through graph learning and psychological context
-
in, May, San Francisco, California, USA
-
O. Brdiczka, J. Liu, B. Price, J. Shen, A. Patil, R. Chow, E. Bart, and N. Ducheneaut, "Proactive insider threat detection through graph learning and psychological context, " in Proc. of the 2012 IEEE Symposium on Security and Privacy Workshops (IEEE SPW'12), San Francisco, California, USA, May 2012, pp. 142-149.
-
(2012)
Proc. of the 2012 IEEE Symposium on Security and Privacy Workshops (IEEE SPW'12)
, pp. 142-149
-
-
Brdiczka, O.1
Liu, J.2
Price, B.3
Shen, J.4
Patil, A.5
Chow, R.6
Bart, E.7
Ducheneaut, N.8
-
30
-
-
84886872895
-
A framework for detecting insider threats using psychological triggers
-
T. Sasaki, "A framework for detecting insider threats using psychological triggers, " Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 3, no. 1/2, pp. 99-119, 2012.
-
(2012)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)
, vol.3
, Issue.1-2
, pp. 99-119
-
-
Sasaki, T.1
-
31
-
-
81155123530
-
A logical high-level framework for critical infrastructure resilience and risk assessment
-
in, September, Milan, Italy
-
S. Creese, M. H. Goldsmith, and A. O. Adetoye, "A logical high-level framework for critical infrastructure resilience and risk assessment, " in Proc. of the 3rd InternationalWorkshop on Cyberspace Safety and Security (CSS'11), Milan, Italy, September 2011, pp. 7-14.
-
(2011)
Proc. of the 3rd InternationalWorkshop on Cyberspace Safety and Security (CSS'11)
, pp. 7-14
-
-
Creese, S.1
Goldsmith, M.H.2
Adetoye, A.O.3
-
33
-
-
0036953920
-
The dark triad of personality: Narcissism, Machiavellianism, and psychopathy
-
D. L. Paulhus and K. M. Williams, "The dark triad of personality: Narcissism, Machiavellianism, and psychopathy, " Journal of research in personality, vol. 36, no. 6, pp. 556-563, 2002.
-
(2002)
Journal of research in personality
, vol.36
, Issue.6
, pp. 556-563
-
-
Paulhus, D.L.1
Williams, K.M.2
-
37
-
-
79960583168
-
-
Software Engineering Institute/Carnegie Mellon University, Tech. Rep. CMU/SEI-2008-TR-009, May
-
A. P. Moore, D. M. Cappelli, and R. F. Trzeciak, "The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures, " Software Engineering Institute/Carnegie Mellon University, Tech. Rep. CMU/SEI-2008-TR-009, May 2008.
-
(2008)
The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures
-
-
Moore, A.P.1
Cappelli, D.M.2
Trzeciak, R.F.3
-
38
-
-
84890927955
-
-
Software Engineering Institute, Carnegie Mellon University, Tech. Rep. CMU/SEI-2011-TN-013, June
-
A. P. Moore, D. M. Cappelli, T. C. Caron, E. Shaw, D. Spooner, and R. Trzeciak, "A Preliminary Model of Insider Theft of Intellectual Property, " Software Engineering Institute, Carnegie Mellon University, Tech. Rep. CMU/SEI-2011-TN-013, June 2011.
-
(2011)
A Preliminary Model of Insider Theft of Intellectual Property
-
-
Moore, A.P.1
Cappelli, D.M.2
Caron, T.C.3
Shaw, E.4
Spooner, D.5
Trzeciak, R.6
-
39
-
-
70449641709
-
AZALIA: An A to Z assessment of the likelihood of insider attack
-
in, IEEE, May, Boston, Massachusetts, USA
-
M. Bishop, C. Gates, D. Frincke, and F. Greitzer, "AZALIA: an A to Z assessment of the likelihood of insider attack, " in Proc. of the IEEE 2009 Conference on Technologies for Homeland Security (HST'09), Boston, Massachusetts, USA. IEEE, May 2009, pp. 385-392.
-
(2009)
Proc. of the IEEE 2009 Conference on Technologies for Homeland Security (HST'09)
, pp. 385-392
-
-
Bishop, M.1
Gates, C.2
Frincke, D.3
Greitzer, F.4
|