-
1
-
-
84862666499
-
-
Ponemon Institute. (Available from:) [Accessed on 2 August, 2011], April
-
Ponemon Institute. Security of cloud computing providers study. (Available from: http://www.ca.com/~/media/Files/IndustryResearch/security-of-cloud-computing-providers-final-april-2011.pdf) [Accessed on 2 August, 2011], April 2011.
-
(2011)
Security of Cloud Computing Providers Study
-
-
-
6
-
-
84868152765
-
Insider attacks in cloud computing
-
IEEE
-
Duncan AJ, Creese S, Goldsmith M,. Insider attacks in cloud computing. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, 2012; 857-862.
-
(2012)
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
, pp. 857-862
-
-
Duncan, A.J.1
Creese, S.2
Goldsmith, M.3
-
7
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
Schultz EE,. A framework for understanding and predicting insider attacks. Computers & Security 2002; 21 (6): 526-531.
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
10
-
-
84937733540
-
-
[Accessed on 22 September 2011], 13, July
-
Chu B,. Just how secure are police databases? (Available from: http://blogs.independent.co.uk/2011/07/13/just-how-secure-are-police-databases) [Accessed on 22 September 2011], 13, July 2011.
-
(2011)
Just How Secure Are Police Databases?
-
-
Chu, B.1
-
12
-
-
84886459471
-
-
[Accessed on 7 October 2011], 24, March
-
Galpin R,. Death muddies greek spy probe. (Available from: http://news.bbc.co.uk/1/hi/world/europe/4838552.stm) [Accessed on 7 October 2011], 24, March 2006.
-
(2006)
Death Muddies Greek Spy Probe
-
-
Galpin, R.1
-
13
-
-
84937728890
-
-
[Accessed on 7 October, 2011], June
-
Kowalski E, Cappelli D, Moore A, Randazzo MR, Keeney M,. Insider threat study: illicit cyber activity in the banking and finance sector. (Available from: http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA441249) [Accessed on 7 October, 2011], June 2005.
-
(2005)
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
-
-
Kowalski, E.1
Cappelli, D.2
Moore, A.3
Randazzo, M.R.4
Keeney, M.5
-
14
-
-
33644904044
-
The role of behavioral research and profiling in malicious cyber insider investigations
-
Shaw ED,. The role of behavioral research and profiling in malicious cyber insider investigations. Digital Investigation 2006; 3 (1): 20-31.
-
(2006)
Digital Investigation
, vol.3
, Issue.1
, pp. 20-31
-
-
Shaw, E.D.1
-
17
-
-
2642515264
-
-
National Institute of Standards and Technology (NIST). [Accessed on 20 October, 2011]
-
National Institute of Standards and Technology (NIST). NIST special publication on intrusion detection systems. (Available from: http://handle.dtic.mil/100.2/ADA393326) [Accessed on 20 October, 2011], 2001.
-
(2001)
NIST Special Publication on Intrusion Detection Systems
-
-
-
19
-
-
84937730442
-
-
[Accessed on 2 August, 2011], 30, April
-
Taylor J,. Sony hackers 'stole 2 million cards'. (Available from: http://www.independent.co.uk/news/uk/crime/sony-hackers-stole-2-million-cards-2276853.html) [Accessed on 2 August, 2011], 30, April 2011.
-
(2011)
Sony Hackers 'Stole 2 Million Cards'
-
-
Taylor, J.1
-
20
-
-
84937724134
-
-
[Accessed on 2 August], 2011, 3, May
-
Goodin D,. Sony says data for 25 million more customers stolen. (Available from: http://www.theregister.co.uk/2011/05/03/sony-hack-exposes-more-customers) [Accessed on 2 August], 2011, 3, May 2011.
-
(2011)
Sony Says Data for 25 Million More Customers Stolen.
-
-
Goodin, D.1
-
22
-
-
84883310548
-
-
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense V, 2006
-
Giani A, Berk VH, Cybenko GV,. Data exfiltration and covert channels. in Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense V, 2006.
-
Data Exfiltration and Covert Channels
-
-
Giani, A.1
Berk, V.H.2
Cybenko, G.V.3
-
23
-
-
84874116437
-
-
[Accessed on 29 January 2013], August 2011
-
Cloud security alliance. Security as a service working group. (Available from: https://wiki.cloudsecurityalliance.org/group9-wg/index.php/Main-Page) [Accessed on 29 January 2013], August 2011.
-
Cloud Security Alliance. Security As A Service Working Group
-
-
-
24
-
-
84937726425
-
-
SANS Institute. (Available from:) [Accessed on 22 August, 2011], June 2007
-
SANS Institute. Correlating SIM information to detect insider threats. (Available from: http://www.sans.org/reading-room/analysts-program/SIMInfo-June07.pdf) [Accessed on 22 August, 2011], June 2007.
-
Correlating SIM Information to Detect Insider Threats
-
-
-
25
-
-
63349106731
-
SIDD: A framework for detecting sensitive data exfiltration by an insider attack
-
Liu Y, Corbett C, Chiang K, Archibald R, Mukherjee B, Ghosal D,. SIDD: A framework for detecting sensitive data exfiltration by an insider attack. Hawaii International Conference on System Sciences 2009; 0: 1-10.
-
(2009)
Hawaii International Conference on System Sciences
, pp. 1-10
-
-
Liu, Y.1
Corbett, C.2
Chiang, K.3
Archibald, R.4
Mukherjee, B.5
Ghosal, D.6
-
28
-
-
84937739040
-
-
[Accessed on 18 August, 2011], August 2011
-
Simply safes. Decoy safes. (Available from: http://www.simplysafes.co.uk/decoy-safes-c-100-76.html) [Accessed on 18 August, 2011], August 2011.
-
Simply Safes. Decoy Safes
-
-
-
29
-
-
84937734931
-
-
[Accessed on 18 August, 2011], 26, February
-
Herald SM,. Fake security guards s̈teal close to 1 millionfrom Sydney bank. (Available from: http://www.smh.com.au/nsw/fake-security-guards-steal-close-to-1-million-from-sydney-bank-20100226-p7i3.html) [Accessed on 18 August, 2011], 26, February 2010.
-
(2010)
Fake Security Guards ͆teal Close to 1 Millionfrom Sydney Bank
-
-
Herald, S.M.1
-
30
-
-
84937725021
-
-
[Accessed on 16 January, 2012], 29, November
-
Moskowitz R,. Hijinks on the high seas. (Available from: http://www.networkcomputing.com/1024/1024colmoskowitz.html) [Accessed on 16 January, 2012], 29, November 1999.
-
(1999)
Hijinks on the High Seas
-
-
Moskowitz, R.1
-
32
-
-
15944378973
-
-
[Accessed on 24 January, 2012], 17, July
-
Spitzner L,. Honeytokens: the other honeypot. (Available from: http://www.symantec.com/connect/articles/honeytokens-other-honeypot) [Accessed on 24 January, 2012], 17, July 2003.
-
(2003)
Honeytokens: The Other Honeypot
-
-
Spitzner, L.1
-
34
-
-
84937739333
-
-
[Accessed on 27 January, 2012], 13, November
-
Forensics Wiki. Prefetch. (Available from: http://www.forensicswiki.org/wiki/Prefetch) [Accessed on 27 January, 2012], 13, November 2011.
-
(2011)
Forensics Wiki. Prefetch
-
-
-
35
-
-
84960376125
-
-
[Accessed on 27 January], 2012, September 2008
-
Parsonage H,. The meaning of linkfiles in forensic examinations. (Available from: http://computerforensics.parsonage.co.uk/downloads/TheMeaningofLIFE.pdf) [Accessed on 27 January], 2012, September 2008.
-
The Meaning of Linkfiles in Forensic Examinations
-
-
Parsonage, H.1
-
36
-
-
84893478856
-
-
[Accessed on 6 September 2012], 15, July
-
Galpin R,. Photorec. (Available from: http://www.cgsecurity.org/wiki/PhotoRec) [Accessed on 6 September 2012], 15, July 2011.
-
(2011)
Photorec
-
-
Galpin, R.1
-
39
-
-
70849107663
-
Empirical exploitation of live virtual machine migration
-
[Accessed on 14 March 2014]
-
Oberheide J, Cooke E, Jahanian F,. Empirical exploitation of live virtual machine migration. Proceedings of BlackHat DC Convention, 2008. (Available from: https://www.blackhat.com/presentations/bh-dc-08/Oberheide/Whitepaper/bh-dc-08-oberheide-WP.pdf) [Accessed on 14 March 2014].
-
(2008)
Proceedings of BlackHat DC Convention
-
-
Oberheide, J.1
Cooke, E.2
Jahanian, F.3
|