{"title":"A Survey of Insider Attack Detection Research","authors":"M. B. Salem, Shlomo Hershkop, S. Stolfo","doi":"10.1007/978-0-387-77322-3_5","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_5","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127342194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The \"Big Picture\" of Insider IT Sabotage Across U.S. Critical Infrastructures","authors":"A. Moore, Dawn M. Cappelli, Randall F. Trzeciak","doi":"10.1007/978-0-387-77322-3_3","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_3","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127662942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Iyer, P. Dabrowski, Nithin Nakka, Z. Kalbarczyk
{"title":"Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach","authors":"R. Iyer, P. Dabrowski, Nithin Nakka, Z. Kalbarczyk","doi":"10.1007/978-0-387-77322-3_8","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_8","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131359776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure","authors":"Kevin S. Killourhy, R. Maxion","doi":"10.1007/978-0-387-77322-3_6","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_6","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123985343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat","authors":"Jeffrey Hunker","doi":"10.1007/978-0-387-77322-3_11","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_11","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133828026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reflections on the Insider Threat","authors":"C. Pfleeger","doi":"10.1007/978-0-387-77322-3_2","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_2","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115854230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hard Problems and Research Challenges Concluding Remarks","authors":"A. Keromytis","doi":"10.1007/978-0-387-77322-3_13","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_13","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122365967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Insider Attack Problem Nature and Scope","authors":"S. Bellovin","doi":"10.1007/978-0-387-77322-3_1","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_1","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130396076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Surviving Insider Attacks: A Call for System Experiments","authors":"V. Gligor, C. Chandersekaran","doi":"10.1007/978-0-387-77322-3_9","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_9","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130893775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preventative Directions For Insider Threat Mitigation Via Access Control","authors":"S. Sinclair, Sean W. Smith","doi":"10.1007/978-0-387-77322-3_10","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_10","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115999432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}