default search action
Insider Attack and Cyber Security 2008
- Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair:
Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6 - Steven M. Bellovin:
The Insider Attack Problem Nature and Scope. 1-4 - Charles P. Pfleeger:
Reflections on the Insider Threat. 5-16 - Andrew P. Moore, Dawn M. Cappelli, Randall F. Trzeciak:
The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures. 17-52 - Michael McCormick:
Data Theft: A Prototypical Insider Threat. 53-68 - Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo:
A Survey of Insider Attack Detection Research. 69-90 - Kevin S. Killourhy, Roy A. Maxion:
Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure. 91-112 - Ravi Sahita, Uday R. Savagaonkar:
Towards a Virtualization-enabled Framework for Information Traceability (VFIT). 113-132 - Ravishankar K. Iyer, Paul Dabrowski, Nithin Nakka, Zbigniew Kalbarczyk:
Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach. 133-152 - Virgil D. Gligor, C. Sekar Chandersekaran:
Surviving Insider Attacks: A Call for System Experiments. 153-164 - Sara Sinclair, Sean W. Smith:
Preventative Directions For Insider Threat Mitigation Via Access Control. 165-194 - Jeffrey Hunker:
Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat. 195-214 - Angelos D. Keromytis:
Hard Problems and Research Challenges. 215-218 - Angelos D. Keromytis:
Hard Problems and Research Challenges Concluding Remarks. 219-222
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.