-
1
-
-
77954051808
-
Effectively and securely using the cloud computing paradigm
-
Information Technology Lab
-
Mell, Peter, and Tim Grance. "Effectively and securely using the cloud computing paradigm. " NIST, Information Technology Lab (2009).
-
(2009)
NIST
-
-
Mell, P.1
Grance, T.2
-
3
-
-
78650609369
-
Security guidance for critical areas of focus in cloud computing
-
Brunette, Glenn, and Rich Mogull. "Security guidance for critical areas of focus in cloud computing v2. 1. " Cloud Security Alliance (2009): 1-76.
-
(2009)
Cloud Security Alliance
, vol.1
, pp. 1-76
-
-
Brunette, G.1
Mogull, R.2
-
10
-
-
84868152765
-
Insider attacks in cloud computing
-
Duncan, Adrian J., Sadie Creese, and Michael Goldsmith. "Insider attacks in cloud computing. " Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. IEEE, 2012.
-
(2012)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference On. IEEE
-
-
Duncan, A.J.1
Creese, S.2
Goldsmith, M.3
-
11
-
-
24644470542
-
The insider threat to information systems and the effectiveness of ISO17799
-
Theoharidou, Marianthi, et al. "The insider threat to information systems and the effectiveness of ISO17799. " Computers & Security 24. 6 (2005): 472-484.
-
(2005)
Computers & Security
, vol.24
, Issue.6
, pp. 472-484
-
-
Theoharidou, M.1
-
12
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
Schultz, E. Eugene. "A framework for understanding and predicting insider attacks. " Computers & Security 21. 6 (2002): 526-531.
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
16
-
-
0034226287
-
A revised taxonomy for intrusion-detection systems
-
Springer-Verlag
-
Debar, Hervé, Marc Dacier, and Andreas Wespi. "A revised taxonomy for intrusion-detection systems. " Annales des télécommunications. Vol. 55. No. 7-8. Springer-Verlag, 2000.
-
(2000)
Annales des Télécommunications.
, vol.55
, Issue.7-8
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
17
-
-
84946410215
-
Detecting insider threats by monitoring system call activity
-
Nguyen, Nam T., Peter L. Reiher, and Geoffrey H. Kuenning. "Detecting Insider Threats by Monitoring System Call Activity. " IAW. 2003.
-
(2003)
IAW.
-
-
Nguyen, N.T.1
Reiher, P.L.2
Kuenning, G.H.3
-
19
-
-
0036173202
-
Insider threat prediction tool: Evaluating the probability of IT misuse
-
Magklaras, G. B., and S. M. Furnell. "Insider threat prediction tool: Evaluating the probability of IT misuse. " Computers & Security 21. 1 (2001): 62-73.
-
(2001)
Computers & Security
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
20
-
-
24344460927
-
A preliminary model of end user sophistication for insider threat prediction in IT systems
-
Magklaras, G. B., and S. M. Furnell. "A preliminary model of end user sophistication for insider threat prediction in IT systems. " Computers & Security 24. 5 (2005): 371-380.
-
(2005)
Computers & Security
, vol.24
, Issue.5
, pp. 371-380
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
21
-
-
78049354490
-
An insider threat prediction model
-
Springer Berlin Heidelberg
-
Kandias, Miltiadis, et al. "An insider threat prediction model. " Trust, Privacy and Security in Digital Business. Springer Berlin Heidelberg, 2010. 26-37.
-
(2010)
Trust, Privacy and Security in Digital Business
, pp. 26-37
-
-
Kandias, M.1
-
24
-
-
84861821993
-
User authentication via keystroke dynamics based on difference subspace and slope correlation degree
-
Wang, Xuan, Fangxia Guo, and Jian-feng Ma. "User authentication via keystroke dynamics based on difference subspace and slope correlation degree. " Digital Signal Processing 22. 5 (2012): 707-712.
-
Digital Signal Processing 22. 5 (2012): 707-712
-
-
Wang, X.1
Guo, F.2
Ma, J.3
-
26
-
-
34249913467
-
Retraining a keystroke dynamics-based authenticator with impostor patterns
-
Lee, Hyoung-joo, and Sungzoon Cho. "Retraining a keystroke dynamics-based authenticator with impostor patterns. " Computers & Security 26. 4 (2007): 300-310.
-
(2007)
Computers & Security
, vol.26
, Issue.4
, pp. 300-310
-
-
Lee, H.-J.1
Cho, S.2
-
27
-
-
84860515716
-
Continuous keystroke dynamics: A different perspective towards biometric evaluation
-
Bours, Patrick. "Continuous keystroke dynamics: A different perspective towards biometric evaluation. " Information Security Technical Report 17. 1 (2012): 36-43.
-
(2012)
Information Security Technical Report
, vol.17
, Issue.1
, pp. 36-43
-
-
Bours, P.1
-
28
-
-
37849044963
-
Keystroke dynamics in a general setting
-
Springer Berlin Heidelberg
-
Janakiraman Rajkumar, and Terence Sim. "Keystroke dynamics in a general setting. " Advances in Biometrics. Springer Berlin Heidelberg, 2007. 584-593.
-
(2007)
Advances in Biometrics
, pp. 584-593
-
-
Rajkumar, J.1
Sim, T.2
-
29
-
-
84923237785
-
-
http://nlp. stanford. edu/IR-book/html/htmledition/support-vectormachines-the-linearly-separable-case-1. html.
-
-
-
-
30
-
-
25444522689
-
Fast kernel classifiers with online and active learning
-
Bordes, Antoine, et al. "Fast kernel classifiers with online and active learning. " The Journal of Machine Learning Research 6 (2005): 1579-1619.
-
(2005)
The Journal of Machine Learning Research
, vol.6
, pp. 1579-1619
-
-
Bordes, A.1
-
32
-
-
0000913324
-
SVMTorch: Support vector machines for large-scale regression problems
-
Collobert, Ronan, and Samy Bengio. "SVMTorch: Support vector machines for large-scale regression problems. " The Journal of Machine Learning Research 1 (2001): 143-160.
-
(2001)
The Journal of Machine Learning Research
, vol.1
, pp. 143-160
-
-
Collobert, R.1
Bengio, S.2
-
34
-
-
84923237784
-
-
http://www. ratatype. com/learn/average-typing-speed/
-
-
-
|