메뉴 건너뛰기




Volumn 4, Issue 4, 2013, Pages 20-37

Towards a conceptual model and reasoning structure for insider threat detection

Author keywords

Conceptual model; Insider threat; Reasoning structure

Indexed keywords


EID: 84890952452     PISSN: 20935374     EISSN: 20935382     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (61)

References (39)
  • 6
    • 84890939088 scopus 로고    scopus 로고
    • BBC News
    • BBC News, "Profile: Edward Snowden, " 2013, http://www.bbc.co.uk/news/world-us-canada-22837100.
    • (2013) Profile: Edward Snowden
  • 11
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • [Online]. Available
    • E. E. Schultz, "A framework for understanding and predicting insider attacks, " Computers and Security, vol. 21, no. 6, pp. 526-531, 2002. [Online]. Available: http://www.sciencedirect.com/science/article/pii/ S016740480201009X
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 13
    • 0036173202 scopus 로고    scopus 로고
    • Insider Threat Prediction Tool: Evaluating the probability of IT misuse
    • G. B. Magklaras and S. M. Furnell, "Insider Threat Prediction Tool: Evaluating the probability of IT misuse, " Computers and Security, vol. 21, no. 1, pp. 62-73, 2002.
    • (2002) Computers and Security , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.B.1    Furnell, S.M.2
  • 25
    • 33644904044 scopus 로고    scopus 로고
    • The role of behavioral research and profiling in malicious cyber insider investigations
    • E. D. Shaw, "The role of behavioral research and profiling in malicious cyber insider investigations, " Digital Investigation, vol. 3, no. 1, pp. 20-31, 2006.
    • (2006) Digital Investigation , vol.3 , Issue.1 , pp. 20-31
    • Shaw, E.D.1
  • 26
    • 77956652072 scopus 로고    scopus 로고
    • Human factors in information security: The insider threat-Who can you trust these days?
    • C. Colwill, "Human factors in information security: The insider threat-Who can you trust these days?" Information Security Technical Report, vol. 14, no. 4, pp. 186-196, 2009.
    • (2009) Information Security Technical Report , vol.14 , Issue.4 , pp. 186-196
    • Colwill, C.1
  • 27
    • 84857963677 scopus 로고    scopus 로고
    • Modeling Human Behavior to Anticipate Insider Attacks
    • F. L. Greitzer and R. E. Hohimer, "Modeling Human Behavior to Anticipate Insider Attacks, " Journal of Strategic Security, vol. 4, no. 2, pp. 25-48, 2011.
    • (2011) Journal of Strategic Security , vol.4 , Issue.2 , pp. 25-48
    • Greitzer, F.L.1    Hohimer, R.E.2
  • 33
    • 0036953920 scopus 로고    scopus 로고
    • The dark triad of personality: Narcissism, Machiavellianism, and psychopathy
    • D. L. Paulhus and K. M. Williams, "The dark triad of personality: Narcissism, Machiavellianism, and psychopathy, " Journal of research in personality, vol. 36, no. 6, pp. 556-563, 2002.
    • (2002) Journal of research in personality , vol.36 , Issue.6 , pp. 556-563
    • Paulhus, D.L.1    Williams, K.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.