-
1
-
-
85054455230
-
Tamper detection in audit logs
-
Toronto, Canada
-
R. T. Snodgrass, S. S. Yao, and C. Collberg, "Tamper detection in audit logs," presented at the Proceedings of the Thirtieth international conference on Very large data bases-Volume 30, Toronto, Canada, 2004.
-
(2004)
Presented at the Proceedings of the Thirtieth International Conference on Very Large Data Bases-Volume 30
-
-
Snodgrass, R.T.1
Yao, S.S.2
Collberg, C.3
-
7
-
-
84886723209
-
A survey on security issues and solutions at different layers of Cloud computing
-
Feb
-
C. Modi, D. Patel, B. Borisaniya, et al., "A survey on security issues and solutions at different layers of Cloud computing," The J. of Supercomput., vol. 63, pp. 561-592, Feb 2013.
-
(2013)
The J. of Supercomput
, vol.63
, pp. 561-592
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
-
8
-
-
81055138877
-
Cloud computing security considerations
-
A. Tripathi and A. Mishra, "Cloud computing security considerations," in Signal Process., Commun. and Comput. (ICSPCC), 2011 IEEE Int. Conference on, 2011, pp. 1-5.
-
(2011)
Signal Process., Commun. and Comput. (ICSPCC), 2011 IEEE Int. Conference on
, pp. 1-5
-
-
Tripathi, A.1
Mishra, A.2
-
9
-
-
77957070672
-
User participation in information systems security risk management
-
Sep
-
J. L. Spears and H. Barki, "User participation in information systems security risk management," MIS quarterly, vol. 34, pp. 503-522, Sep 2010.
-
(2010)
MIS Quarterly
, vol.34
, pp. 503-522
-
-
Spears, J.L.1
Barki, H.2
-
10
-
-
84966806043
-
Common sense guide to mitigating insider threats 4th edition
-
G. Silowash, D. Cappelli, A. Moore, et al., "Common Sense Guide to Mitigating Insider Threats 4th Edition," DTIC Document 2012.
-
(2012)
DTIC Document
-
-
Silowash, G.1
Cappelli, D.2
Moore, A.3
-
11
-
-
84986131258
-
Understanding customer relationship management (CRM)
-
I. J. Chen and K. Popovich, "Understanding customer relationship management (CRM)," Buss. Process Manage. J., vol. 9, pp. 672-688, 2003.
-
(2003)
Buss. Process Manage. J
, vol.9
, pp. 672-688
-
-
Chen, I.J.1
Popovich, K.2
-
12
-
-
58049101580
-
Analyzing interaction between distributed denial of service attacks and mitigation technologies
-
W. J. Blackert, D. M. Gregg, A. K. Castner, et al., "Analyzing interaction between distributed denial of service attacks and mitigation technologies," in DARPA Information Survivability Conference and Exposition, 2003. Proceedings, 2003, pp. 26-36 vol.1.
-
(2003)
DARPA Information Survivability Conference and Exposition, 2003. Proceedings
, vol.1
, pp. 26-36
-
-
Blackert, W.J.1
Gregg, D.M.2
Castner, A.K.3
-
13
-
-
79959557055
-
Addressing cloud computing security issues
-
D. Zissis and D. Lekkas, "Addressing cloud computing security issues," Future Gener. Comput. Syst., vol. 28, pp. 583-592, 2012.
-
(2012)
Future Gener. Comput. Syst
, vol.28
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
14
-
-
84966827093
-
-
(26/04/2015)
-
C. Budd. (26/04/2015). Security Threats. Available: https://technet.microsoft.com/enus/ library/cc723507.aspx#XSLTsection124121120120
-
Security Threats
-
-
Budd, C.1
-
15
-
-
84915813172
-
-
Solutions, Verizon Enterprise
-
V. E. Solutions, "2013 Data Breach Investigations Report," Solutions, Verizon Enterprise, http://www.verizonenterprise.com/resources/reports/rp-databreach-investigations-report-2013-en-xg.pdf2014.
-
2013 Data Breach Investigations Report
-
-
Solutions, V.E.1
-
17
-
-
84858158707
-
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
-
Jun
-
M. T. Khorshed, A. B. M. S. Ali, and S. A. Wasimi, "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing," Future Gener. Comput. Syst., vol. 28, pp. 833-851, Jun 2012.
-
(2012)
Future Gener. Comput. Syst
, vol.28
, pp. 833-851
-
-
Khorshed, M.T.1
Ali, A.B.M.S.2
Wasimi, S.A.3
-
19
-
-
84901664760
-
Exploration of communication networks from the Enron email corpus
-
J. Diesner and K. M. Carley, "Exploration of communication networks from the Enron email corpus," in SIAM International Conference on Data Mining: Workshop on Link Analysis, Counterterrorism and Security, Newport Beach, CA, 2005.
-
(2005)
SIAM International Conference on Data Mining: Workshop on Link Analysis, Counterterrorism and Security, Newport Beach, CA
-
-
Diesner, J.1
Carley, K.M.2
-
20
-
-
85021950441
-
Secure audit logs to support computer forensics
-
B. Schneier and J. Kelsey, "Secure audit logs to support computer forensics," ACM Trans. Inf. Syst. Secur., vol. 2, pp. 159-176, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur
, vol.2
, pp. 159-176
-
-
Schneier, B.1
Kelsey, J.2
-
21
-
-
79952545666
-
Data theft: A prototypical insider threat
-
S. Stolfo, S. Bellovin, Eds., et al., ed: Springer US
-
M. McCormick, "Data Theft: A Prototypical Insider Threat," in Insider Attack and Cyber Security. vol. 39, S. Stolfo, S. Bellovin, Eds., et al., ed: Springer US, 2008, pp. 53-68.
-
(2008)
Insider Attack and Cyber Security
, vol.39
, pp. 53-68
-
-
McCormick, M.1
-
22
-
-
84868152765
-
Insider attacks in cloud computing
-
A. J. Duncan, S. Creese, and M. Goldsmith, "Insider Attacks in Cloud Computing," in Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, 2012, pp. 857-862.
-
(2012)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
, pp. 857-862
-
-
Duncan, A.J.1
Creese, S.2
Goldsmith, M.3
-
23
-
-
84958754081
-
Cloud Forensics
-
G. Peterson and S. Shenoi, Eds., ed: Springer Berlin Heidelberg
-
K. Ruan, J. Carthy, T. Kechadi, et al., "Cloud Forensics," in Advances in Digital Forensics VII. vol. 361, G. Peterson and S. Shenoi, Eds., ed: Springer Berlin Heidelberg, 2011, pp. 35-46.
-
(2011)
Advances in Digital Forensics VII
, vol.361
, pp. 35-46
-
-
Ruan, K.1
Carthy, J.2
Kechadi, T.3
-
24
-
-
84967082918
-
-
Symantec, "Avoiding the Hidden Costs of the Cloud," https://www.symantec.com/content/en/us/about/media/pdfs/bstate-of-cloud-global-results-2013.en-us.pdf2013.
-
Avoiding the Hidden Costs of the Cloud
-
-
-
25
-
-
77957955892
-
Attack surfaces: A taxonomy for attacks on cloud services
-
N. Gruschka and M. Jensen, "Attack Surfaces: A Taxonomy for Attacks on Cloud Services," in IEEE CLOUD, 2010, pp. 276-279.
-
(2010)
IEEE CLOUD
, pp. 276-279
-
-
Gruschka, N.1
Jensen, M.2
-
26
-
-
84885822769
-
The insider threat in cloud computing
-
ed: Springer
-
M. Kandias, N. Virvilis, and D. Gritzalis, "The Insider Threat in Cloud Computing," in Critical Inform. Infrastructure Security, ed: Springer, 2013, pp. 93-103.
-
(2013)
Critical Inform. Infrastructure Security
, pp. 93-103
-
-
Kandias, M.1
Virvilis, N.2
Gritzalis, D.3
|