-
1
-
-
84920266699
-
Cyber security analytics: a stochastic model for security quantification using absorbing markov chains
-
Abraham, S., Nair, S., Cyber security analytics: a stochastic model for security quantification using absorbing markov chains. J Commun 9:12 (2014), 899–907.
-
(2014)
J Commun
, vol.9
, Issue.12
, pp. 899-907
-
-
Abraham, S.1
Nair, S.2
-
2
-
-
33745009333
-
A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks
-
Artail, H., Safa, H., Sraj, M., Kuwatly, I., Al-Masri, Z., A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. Comput Secur 25:4 (2006), 274–288.
-
(2006)
Comput Secur
, vol.25
, Issue.4
, pp. 274-288
-
-
Artail, H.1
Safa, H.2
Sraj, M.3
Kuwatly, I.4
Al-Masri, Z.5
-
3
-
-
84923247840
-
Analyzing user behavior using keystroke dynamics to protect cloud from malicious insiders
-
Bondada, M.B., Bhanu, S.M.S., Analyzing user behavior using keystroke dynamics to protect cloud from malicious insiders. 2014 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2014, 2015, 1–8.
-
(2015)
2014 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2014
, pp. 1-8
-
-
Bondada, M.B.1
Bhanu, S.M.S.2
-
4
-
-
84866627419
-
Fog computing and its role in the Internet of Things
-
Bonomi, F., Milito, R., Zhu, J., Addepalli, S., Fog computing and its role in the Internet of Things. Proc. first Ed. MCC Work. Mob. cloud Comput, 2012, 13–16.
-
(2012)
Proc. first Ed. MCC Work. Mob. cloud Comput
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
5
-
-
75149143441
-
Designing host and network sensors to mitigate the insider threat
-
Bowen, B.M., Ben Salem, M., Hershkop, S., Keromytis, A.D., Stolfo, S.J., Designing host and network sensors to mitigate the insider threat. IEEE Secur Priv 7:6 (2009), 22–29.
-
(2009)
IEEE Secur Priv
, vol.7
, Issue.6
, pp. 22-29
-
-
Bowen, B.M.1
Ben Salem, M.2
Hershkop, S.3
Keromytis, A.D.4
Stolfo, S.J.5
-
6
-
-
27544447707
-
Towards a theory of insider threat assessment
-
Chinchani, R., Iyer, A., Ngo, H.Q., Upadhyaya, S., Towards a theory of insider threat assessment. 2005 Int. Conf. dependable Syst. networks, 2005.
-
(2005)
2005 Int. Conf. dependable Syst. networks
-
-
Chinchani, R.1
Iyer, A.2
Ngo, H.Q.3
Upadhyaya, S.4
-
7
-
-
79956153885
-
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
-
Chonka, A., Xiang, Y., Zhou, W., Bonti, A., Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J Netw Comput Appl 34:4 (2011), 1097–1107.
-
(2011)
J Netw Comput Appl
, vol.34
, Issue.4
, pp. 1097-1107
-
-
Chonka, A.1
Xiang, Y.2
Zhou, W.3
Bonti, A.4
-
8
-
-
77956652072
-
Human factors in information security: the insider threat – who can you trust these days?
-
Colwill, C., Human factors in information security: the insider threat – who can you trust these days?. Inf Secur Tech Rep 14:4 (2009), 186–196.
-
(2009)
Inf Secur Tech Rep
, vol.14
, Issue.4
, pp. 186-196
-
-
Colwill, C.1
-
9
-
-
84916880720
-
An ontology for insider threat indicators development and applications
-
Costa, D.L., Collins, M.L., Perl, S.J., Albrethsen, M.J., Silowash, G.J., Spooner, D.L., An ontology for insider threat indicators development and applications. CEUR workshop proceedings, vol. 1304, 2014, 48–53.
-
(2014)
CEUR workshop proceedings
, vol.1304
, pp. 48-53
-
-
Costa, D.L.1
Collins, M.L.2
Perl, S.J.3
Albrethsen, M.J.4
Silowash, G.J.5
Spooner, D.L.6
-
10
-
-
34248188820
-
Hidden Markov models in bioinformatics
-
De Fonzo, V., Aluffi-Pentini, F., Parisi, V., Hidden Markov models in bioinformatics. Curr Bioinform 2:1 (2007), 49–61.
-
(2007)
Curr Bioinform
, vol.2
, Issue.1
, pp. 49-61
-
-
De Fonzo, V.1
Aluffi-Pentini, F.2
Parisi, V.3
-
11
-
-
26444544161
-
Hybrid signcryption schemes with insider security
-
Dent, A.W., Hybrid signcryption schemes with insider security. Information security and privacy LNCS, vol. 3574, 2005, 253–266.
-
(2005)
Information security and privacy, LNCS
, vol.3574
, pp. 253-266
-
-
Dent, A.W.1
-
12
-
-
85035067677
-
Circumventing iOS security mechanisms for APT forensic investigations: a security taxonomy for cloud apps
-
D'Orazio, C.J., Choo, K.K.R., Circumventing iOS security mechanisms for APT forensic investigations: a security taxonomy for cloud apps. Future Gener Comput Syst, 2016, 1–15.
-
(2016)
Future Gener Comput Syst
, pp. 1-15
-
-
D'Orazio, C.J.1
Choo, K.K.R.2
-
13
-
-
84994744881
-
A technique to circumvent SSL/TLS validations on iOS devices
-
D'Orazio, C.J., Choo, K.K.R., A technique to circumvent SSL/TLS validations on iOS devices. Future Gener Comput Syst 74 (2017), 366–374.
-
(2017)
Future Gener Comput Syst
, vol.74
, pp. 366-374
-
-
D'Orazio, C.J.1
Choo, K.K.R.2
-
14
-
-
85018406878
-
Data exfiltration from internet of things devices: IOS devices as case studies
-
D'Orazio, C.J., Choo, K.K.R., Yang, L.T., Data exfiltration from internet of things devices: IOS devices as case studies. IEEE Internet Things J 4:2 (2017), 524–535.
-
(2017)
IEEE Internet Things J
, vol.4
, Issue.2
, pp. 524-535
-
-
D'Orazio, C.J.1
Choo, K.K.R.2
Yang, L.T.3
-
15
-
-
84986550725
-
A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps
-
D'Orazio, C.J., Lu, R., Choo, K.K.R., Vasilakos, A.V., A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps. Appl Math Comput 293 (2017), 523–544.
-
(2017)
Appl Math Comput
, vol.293
, pp. 523-544
-
-
D'Orazio, C.J.1
Lu, R.2
Choo, K.K.R.3
Vasilakos, A.V.4
-
16
-
-
0032119668
-
Hierarchical Hidden Markov Model: analysis and applications
-
Fine, S., Singer, Y., Tishby, N., Hierarchical Hidden Markov Model: analysis and applications. Mach Learn 32:1 (1998), 41–62.
-
(1998)
Mach Learn
, vol.32
, Issue.1
, pp. 41-62
-
-
Fine, S.1
Singer, Y.2
Tishby, N.3
-
17
-
-
3142683286
-
Enemies within: the problem of insider attacks
-
Furnell, S., Enemies within: the problem of insider attacks. Comput Fraud Secur 2004:7 (2004), 6–11.
-
(2004)
Comput Fraud Secur
, vol.2004
, Issue.7
, pp. 6-11
-
-
Furnell, S.1
-
18
-
-
85042464260
-
Glastopf- A Web Application Honeypot
-
[Online]; Available from (Accessed 20 August 2017)
-
Glastopf- A Web Application Honeypot. [Online]; Available from https://www.edgis-security.org/honeypot/glastopf, 2017. (Accessed 20 August 2017)
-
(2017)
-
-
-
19
-
-
38949103680
-
Combating the insider cyber threat
-
Greitzer, F.L., Moore, A.P., Cappelli, D.M., Andrews, D.H., Carroll, L.A., Hull, T.D., Combating the insider cyber threat. IEEE Secur Priv 6:1 (2008), 61–64.
-
(2008)
IEEE Secur Priv
, vol.6
, Issue.1
, pp. 61-64
-
-
Greitzer, F.L.1
Moore, A.P.2
Cappelli, D.M.3
Andrews, D.H.4
Carroll, L.A.5
Hull, T.D.6
-
20
-
-
85029918183
-
Blogs | The Honeynet Project
-
[Online]; Available from (Accessed 13 February 2017)
-
Honeynet Project [Honeypot], Blogs | The Honeynet Project. [Online]; Available from http://www.honeynet.org/. (Accessed 13 February 2017)
-
-
-
-
21
-
-
85014181195
-
Reliability & security issues for IoT-based smart business center: architecture & Markov model
-
Kharchenko, V., Kolisnyk, M., Piskachova, I., Bardis, N., Reliability & security issues for IoT-based smart business center: architecture & Markov model. Proceedings - 2016 3rd International Conference on Mathematics and Computers in Sciences and in Industry, MCSI 2016, 2017, 313–318.
-
(2017)
Proceedings - 2016 3rd International Conference on Mathematics and Computers in Sciences and in Industry, MCSI 2016
, pp. 313-318
-
-
Kharchenko, V.1
Kolisnyk, M.2
Piskachova, I.3
Bardis, N.4
-
22
-
-
67650478235
-
Hidden Markov Model based real time network security quantification method
-
Li, W., Guo, Z., Hidden Markov Model based real time network security quantification method. 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, vol. 2, 2009, 94–100.
-
(2009)
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
, vol.2
, pp. 94-100
-
-
Li, W.1
Guo, Z.2
-
23
-
-
84870713037
-
Intrusion detection system: a comprehensive review
-
Liao, H.-J., Richard Lin, C.-H., Lin, Y.-C., Tung, K.-Y., Intrusion detection system: a comprehensive review. J Netw Comput Appl 36 (2012), 16–24.
-
(2012)
J Netw Comput Appl
, vol.36
, pp. 16-24
-
-
Liao, H.-J.1
Richard Lin, C.-H.2
Lin, Y.-C.3
Tung, K.-Y.4
-
24
-
-
68949143256
-
Game-theoretic modeling and analysis of insider threats
-
Liu, D., Wang, X., Camp, J., Game-theoretic modeling and analysis of insider threats. Int J Crit Infrastruct Prot 1 (2008), 75–80.
-
(2008)
Int J Crit Infrastruct Prot
, vol.1
, pp. 75-80
-
-
Liu, D.1
Wang, X.2
Camp, J.3
-
25
-
-
34548364110
-
Insider attacker detection in wireless sensor networks
-
Liu, F., Cheng, X., Chen, D., Insider attacker detection in wireless sensor networks. IEEE INFOCOM 2007 – 26th IEEE International Conference on Computer Communications, 2007, 1937–1945.
-
(2007)
IEEE INFOCOM 2007 – 26th IEEE International Conference on Computer Communications
, pp. 1937-1945
-
-
Liu, F.1
Cheng, X.2
Chen, D.3
-
26
-
-
84940996194
-
Fog computing: focusing on mobile users at the edge
-
Luan, T.H., Gao, L., Li, Z., Xiang, Y., Sun, L., Fog computing: focusing on mobile users at the edge. eprint arXiv:150201815, 2015, 1–11.
-
(2015)
eprint arXiv:150201815
, pp. 1-11
-
-
Luan, T.H.1
Gao, L.2
Li, Z.3
Xiang, Y.4
Sun, L.5
-
27
-
-
0036173202
-
Insider threat prediction tool: evaluating the probability of IT misuse
-
Magklaras, G.B., Furnell, S.M., Insider threat prediction tool: evaluating the probability of IT misuse. Comput Secur 21:1 (1998), 62–73.
-
(1998)
Comput Secur
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
28
-
-
24344460927
-
A preliminary model of end user sophistication for insider threat prediction in IT systems
-
Magklaras, G.B., Furnell, S.M., A preliminary model of end user sophistication for insider threat prediction in IT systems. Comput Secur 24:5 (2005), 371–380.
-
(2005)
Comput Secur
, vol.24
, Issue.5
, pp. 371-380
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
29
-
-
43149107471
-
A behavioral theory of insider-threat risks
-
Martinez-Moyano, I.J., Rich, E., Conrad, S., Andersen, D.F., Stewart, T.R., A behavioral theory of insider-threat risks. ACM Trans Model Comput Simul 18:2 (2008), 1–27.
-
(2008)
ACM Trans Model Comput Simul
, vol.18
, Issue.2
, pp. 1-27
-
-
Martinez-Moyano, I.J.1
Rich, E.2
Conrad, S.3
Andersen, D.F.4
Stewart, T.R.5
-
30
-
-
84870696413
-
A survey of intrusion detection techniques in Cloud
-
Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M., A survey of intrusion detection techniques in Cloud. J Netw Comput Appl 36:1 (2013), 42–57.
-
(2013)
J Netw Comput Appl
, vol.36
, Issue.1
, pp. 42-57
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, H.4
Patel, A.5
Rajarajan, M.6
-
31
-
-
84903779223
-
Insider threat defined: discovering the prototypical case
-
Mundie, D.A., Perl, S.J., Huth, C.L., Insider threat defined: discovering the prototypical case. J Wirel Mob Netw Ubiquitous Comput Dependable Appl 5:2 (2014), 7–23.
-
(2014)
J Wirel Mob Netw Ubiquitous Comput Dependable Appl
, vol.5
, Issue.2
, pp. 7-23
-
-
Mundie, D.A.1
Perl, S.J.2
Huth, C.L.3
-
32
-
-
84903836776
-
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
-
Ning, P., Sun, K., How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, 2003, 60–67.
-
(2003)
IEEE Systems, Man and Cybernetics Society Information Assurance Workshop
, pp. 60-67
-
-
Ning, P.1
Sun, K.2
-
33
-
-
84956680241
-
Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework
-
Osanaiye, O., Choo, K.K.R., Dlodlo, M., Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J Netw Comput Appl 67 (2016), 147–165.
-
(2016)
J Netw Comput Appl
, vol.67
, pp. 147-165
-
-
Osanaiye, O.1
Choo, K.K.R.2
Dlodlo, M.3
-
34
-
-
84969794985
-
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
-
Osanaiye, O., Cai, H., Choo, K.-K.R., Dehghantanha, A., Xu, Z., Dlodlo, M., Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP J Wirel Commun Netw, 2016(1), 2016, 130.
-
(2016)
EURASIP J Wirel Commun Netw
, vol.2016
, Issue.1
, pp. 130
-
-
Osanaiye, O.1
Cai, H.2
Choo, K.-K.R.3
Dehghantanha, A.4
Xu, Z.5
Dlodlo, M.6
-
35
-
-
85026636505
-
From cloud to fog computing: a review and a conceptual live VM migration framework
-
Osanaiye, O., Chen, S., Yan, Z., Lu, R., Choo, K.K.R., Dlodlo, M., From cloud to fog computing: a review and a conceptual live VM migration framework. IEEE Access 5 (2017), 8284–8300.
-
(2017)
IEEE Access
, vol.5
, pp. 8284-8300
-
-
Osanaiye, O.1
Chen, S.2
Yan, Z.3
Lu, R.4
Choo, K.K.R.5
Dlodlo, M.6
-
36
-
-
84870667876
-
An intrusion detection and prevention system in cloud computing: a systematic review
-
Patel, A., Taghavi, M., Bakhtiyari, K., Celestino Júnior, J., An intrusion detection and prevention system in cloud computing: a systematic review. J Netw Comput Appl 36:1 (2013), 25–41.
-
(2013)
J Netw Comput Appl
, vol.36
, Issue.1
, pp. 25-41
-
-
Patel, A.1
Taghavi, M.2
Bakhtiyari, K.3
Celestino Júnior, J.4
-
37
-
-
84978971732
-
User profiling in intrusion detection: a review
-
Peng, J., Choo, K.-K.R., Ashman, H., User profiling in intrusion detection: a review. J Netw Comput Appl 72 (2016), 14–27.
-
(2016)
J Netw Comput Appl
, vol.72
, pp. 14-27
-
-
Peng, J.1
Choo, K.-K.R.2
Ashman, H.3
-
38
-
-
77249177144
-
Insiders behaving badly: addressing bad actors and their actions
-
Pfleeger, S.L., Predd, J.B., Hunker, J., Bulford, C., Insiders behaving badly: addressing bad actors and their actions. IEEE Trans Inf Foren Secur 5:1 (2010), 169–179.
-
(2010)
IEEE Trans Inf Foren Secur
, vol.5
, Issue.1
, pp. 169-179
-
-
Pfleeger, S.L.1
Predd, J.B.2
Hunker, J.3
Bulford, C.4
-
39
-
-
49249119924
-
Insiders behaving badly
-
Predd, J., Pfleeger, S.L., Hunker, J., Bulford, C., Insiders behaving badly. IEEE Secur Priv 6:4 (2008), 66–70.
-
(2008)
IEEE Secur Priv
, vol.6
, Issue.4
, pp. 66-70
-
-
Predd, J.1
Pfleeger, S.L.2
Hunker, J.3
Bulford, C.4
-
40
-
-
85042492630
-
Key findings from the 2013 US state of cyber-crime survey
-
Available from Online (Accessed 13 February 2017)
-
PriceWaterHouse Coopers L.L.C., Key findings from the 2013 US state of cyber-crime survey. Tech Rep NAVTRADEVCEN, 2013 Available from https://www.pwc.com/en_US/us/increasing-iteffectiveness/publications/assets/us-state-of-cybercrime Online. (Accessed 13 February 2017)
-
(2013)
Tech Rep NAVTRADEVCEN
-
-
PriceWaterHouse Coopers L.L.C.1
-
41
-
-
85042515288
-
-
Probst, C.W., Hunker, J., Gollmann, D., Bishop, M., Insider threats in cyber security, vol. 49, 2010.
-
(2010)
Insider threats in cyber security
, vol.49
-
-
Probst, C.W.1
Hunker, J.2
Gollmann, D.3
Bishop, M.4
-
42
-
-
84963877054
-
Context-oriented web application protection model
-
Prokhorenko, V., Choo, K.K.R., Ashman, H., Context-oriented web application protection model. Appl Math Comput 285 (2016), 59–78.
-
(2016)
Appl Math Comput
, vol.285
, pp. 59-78
-
-
Prokhorenko, V.1
Choo, K.K.R.2
Ashman, H.3
-
43
-
-
84979928325
-
Intent-based extensible real-time PHP supervision framework
-
Prokhorenko, V., Choo, K.K.R., Ashman, H., Intent-based extensible real-time PHP supervision framework. IEEE Trans Inf Foren Secur 11:10 (2016), 2215–2226.
-
(2016)
IEEE Trans Inf Foren Secur
, vol.11
, Issue.10
, pp. 2215-2226
-
-
Prokhorenko, V.1
Choo, K.K.R.2
Ashman, H.3
-
44
-
-
84951790264
-
Web application protection techniques: a taxonomy
-
Prokhorenko, V., Choo, K.K.R., Ashman, H., Web application protection techniques: a taxonomy. J Netw Comput Appl 60 (2016), 95–112.
-
(2016)
J Netw Comput Appl
, vol.60
, pp. 95-112
-
-
Prokhorenko, V.1
Choo, K.K.R.2
Ashman, H.3
-
45
-
-
85042496047
-
Pytbull
-
[Online]; Available from (Accessed 20 August 2017)
-
Pytbull. [Online]; Available from http://pytbull.sourceforge.net, 2017. (Accessed 20 August 2017)
-
(2017)
-
-
-
46
-
-
33646031830
-
Using attack trees to identify malicious attacks from authorized insiders
-
Ray, I., Poolsapassit, N., Using attack trees to identify malicious attacks from authorized insiders. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) LNCS, vol. 3679, 2005, 231–246.
-
(2005)
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), LNCS
, vol.3679
, pp. 231-246
-
-
Ray, I.1
Poolsapassit, N.2
-
47
-
-
84882794354
-
A survey of insider attack detection research
-
Springer US Boston (MA)
-
Salem, M.M.B., Hershkop, S., Stolfo, S.J.S., A survey of insider attack detection research. Advances in information security, vol. 39, 2008, Springer US, Boston (MA), 69–90.
-
(2008)
Advances in information security
, vol.39
, pp. 69-90
-
-
Salem, M.M.B.1
Hershkop, S.2
Stolfo, S.J.S.3
-
48
-
-
67649867487
-
An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks
-
Sardana, A., Joshi, R., An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks. Comput Commun 32:12 (2009), 1384–1399.
-
(2009)
Comput Commun
, vol.32
, Issue.12
, pp. 1384-1399
-
-
Sardana, A.1
Joshi, R.2
-
49
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
Schultz, E.E., A framework for understanding and predicting insider attacks. Comput Secur 21:6 (2002), 526–531.
-
(2002)
Comput Secur
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
50
-
-
85039931018
-
Snort Network Intrusion Detection and Prevention System
-
[Online]; Available from (Accessed 20 August 2017)
-
Snort Network Intrusion Detection and Prevention System. [Online]; Available from https://www.snort.org, 2017. (Accessed 20 August 2017)
-
(2017)
-
-
-
51
-
-
84923241703
-
A hybrid protocol to secure the cloud from insider threats
-
Sriram, M., Patel, V., Harishma, D., Lakshmanan, N., A hybrid protocol to secure the cloud from insider threats. 2014 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2014, 2015, 1–5.
-
(2015)
2014 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2014
, pp. 1-5
-
-
Sriram, M.1
Patel, V.2
Harishma, D.3
Lakshmanan, N.4
-
52
-
-
84912130127
-
The fog computing paradigm: scenarios and security issues
-
Stojmenovic, I., Wen, S., The fog computing paradigm: scenarios and security issues. Proc. 2014 Fed. Conf. Comput. Sci. Inf. Syst, vol. 2, 2014, 1–8.
-
(2014)
Proc. 2014 Fed. Conf. Comput. Sci. Inf. Syst
, vol.2
, pp. 1-8
-
-
Stojmenovic, I.1
Wen, S.2
-
53
-
-
24644470542
-
The insider threat to information systems and the effectiveness of ISO17799
-
Theoharidou, M., Kokolakis, S., Karyda, M., Kiountouzis, E., The insider threat to information systems and the effectiveness of ISO17799. Comput Secur 24:6 (2005), 472–484.
-
(2005)
Comput Secur
, vol.24
, Issue.6
, pp. 472-484
-
-
Theoharidou, M.1
Kokolakis, S.2
Karyda, M.3
Kiountouzis, E.4
-
54
-
-
31044441059
-
A tutorial on Markov models based on Mendel's classical experiments
-
Thorvaldsen, S., A tutorial on Markov models based on Mendel's classical experiments. J Bioinform Comput Biol 3:6 (2005), 1441–1460.
-
(2005)
J Bioinform Comput Biol
, vol.3
, Issue.6
, pp. 1441-1460
-
-
Thorvaldsen, S.1
-
55
-
-
67650170305
-
Behavioral and policy issues in information systems security: the insider threat
-
Warkentin, M., Willison, R., Behavioral and policy issues in information systems security: the insider threat. Eur J Inf Syst 18:2 (2009), 101–105.
-
(2009)
Eur J Inf Syst
, vol.18
, Issue.2
, pp. 101-105
-
-
Warkentin, M.1
Willison, R.2
-
56
-
-
84906346156
-
Detecting insider threat based on document access behavior analysis
-
Springer International Publishing
-
Zhang, R., Chen, X., Shi, J., Xu, F., Pu, Y., Detecting insider threat based on document access behavior analysis. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) LNCS, vol. 8710, 2014, Springer International Publishing, 376–387.
-
(2014)
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), LNCS
, vol.8710
, pp. 376-387
-
-
Zhang, R.1
Chen, X.2
Shi, J.3
Xu, F.4
Pu, Y.5
-
57
-
-
84940604877
-
Xen-based virtual honeypot system for smart device
-
Zhang, W., He, H., Kim, T.H., Xen-based virtual honeypot system for smart device. Multimed Tools Appl 74:19 (2015), 8541–8558.
-
(2015)
Multimed Tools Appl
, vol.74
, Issue.19
, pp. 8541-8558
-
-
Zhang, W.1
He, H.2
Kim, T.H.3
|