Insider Attack and Cyber Security最新文献

筛选
英文 中文
A Survey of Insider Attack Detection Research 内部攻击检测研究综述
Insider Attack and Cyber Security Pub Date : 2008-08-25 DOI: 10.1007/978-0-387-77322-3_5
M. B. Salem, Shlomo Hershkop, S. Stolfo
{"title":"A Survey of Insider Attack Detection Research","authors":"M. B. Salem, Shlomo Hershkop, S. Stolfo","doi":"10.1007/978-0-387-77322-3_5","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_5","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127342194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 305
The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures 美国关键基础设施内部IT破坏的“大图景”
Insider Attack and Cyber Security Pub Date : 2008-05-01 DOI: 10.1007/978-0-387-77322-3_3
A. Moore, Dawn M. Cappelli, Randall F. Trzeciak
{"title":"The \"Big Picture\" of Insider IT Sabotage Across U.S. Critical Infrastructures","authors":"A. Moore, Dawn M. Cappelli, Randall F. Trzeciak","doi":"10.1007/978-0-387-77322-3_3","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_3","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127662942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach 针对内部威胁的可重构防篡改硬件支持:可信ILLIAC方法
Insider Attack and Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-77322-3_8
R. Iyer, P. Dabrowski, Nithin Nakka, Z. Kalbarczyk
{"title":"Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach","authors":"R. Iyer, P. Dabrowski, Nithin Nakka, Z. Kalbarczyk","doi":"10.1007/978-0-387-77322-3_8","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_8","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131359776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure 朴素贝叶斯作为假面检测器:解决一个长期失效
Insider Attack and Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-77322-3_6
Kevin S. Killourhy, R. Maxion
{"title":"Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure","authors":"Kevin S. Killourhy, R. Maxion","doi":"10.1007/978-0-387-77322-3_6","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_6","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123985343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat 盘点和展望——一个局外人对内部威胁的看法
Insider Attack and Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-77322-3_11
Jeffrey Hunker
{"title":"Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat","authors":"Jeffrey Hunker","doi":"10.1007/978-0-387-77322-3_11","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_11","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133828026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reflections on the Insider Threat 对内部威胁的反思
Insider Attack and Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-77322-3_2
C. Pfleeger
{"title":"Reflections on the Insider Threat","authors":"C. Pfleeger","doi":"10.1007/978-0-387-77322-3_2","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_2","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115854230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Hard Problems and Research Challenges Concluding Remarks 难题与研究挑战结束语
Insider Attack and Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-77322-3_13
A. Keromytis
{"title":"Hard Problems and Research Challenges Concluding Remarks","authors":"A. Keromytis","doi":"10.1007/978-0-387-77322-3_13","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_13","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122365967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Insider Attack Problem Nature and Scope 内部攻击问题的性质和范围
Insider Attack and Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-77322-3_1
S. Bellovin
{"title":"The Insider Attack Problem Nature and Scope","authors":"S. Bellovin","doi":"10.1007/978-0-387-77322-3_1","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_1","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130396076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Surviving Insider Attacks: A Call for System Experiments 生存内部攻击:系统实验的呼唤
Insider Attack and Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-77322-3_9
V. Gligor, C. Chandersekaran
{"title":"Surviving Insider Attacks: A Call for System Experiments","authors":"V. Gligor, C. Chandersekaran","doi":"10.1007/978-0-387-77322-3_9","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_9","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130893775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Preventative Directions For Insider Threat Mitigation Via Access Control 通过访问控制缓解内部威胁的预防性指示
Insider Attack and Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-77322-3_10
S. Sinclair, Sean W. Smith
{"title":"Preventative Directions For Insider Threat Mitigation Via Access Control","authors":"S. Sinclair, Sean W. Smith","doi":"10.1007/978-0-387-77322-3_10","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3_10","url":null,"abstract":"","PeriodicalId":250601,"journal":{"name":"Insider Attack and Cyber Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115999432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信