Scalable predicting model for insider threat

被引:0
|
作者
College of Computer Science and Technology, Jilin University, Changchun 130012, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Xuebao | 2006年 / 8卷 / 1346-1355期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [11] Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions
    Mundie, David A.
    Perl, Sam
    Huth, Carly L.
    2013 THIRD WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST (STAST 2013), 2013, : 26 - 36
  • [12] Developing an insider threat model using functional decomposition
    Butts, JW
    Mills, RF
    Baldwin, RO
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 412 - 417
  • [13] A Predictive Model of Insider Threat Based on Bayesian Network
    Wang, Hui
    Wang, Yunfeng
    Yang, Guangcan
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2013, 9 (SPL.ISSUE4) : 69 - 74
  • [14] Algorithm for sensing insider threat based on cloud model
    Zhang, Hong-Bin
    Pei, Qing-Qi
    Ma, Jian-Feng
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 784 - 792
  • [15] A knowledge-base model for insider threat prediction
    Althebyan, Qutaibah
    Panda, Brajendra
    2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 239 - +
  • [16] The insider threat ‘zoo’
    Renaud K.
    Warkentin M.
    Computer Fraud and Security, 2024, 2024 (05):
  • [18] Addressing the insider threat
    Application Security Inc
    Netw. Secur., 2008, 3 (11-14):
  • [19] Reflections on the insider threat
    Pfleeger, Charles P.
    INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 5 - 15
  • [20] A Bayesian Network Model for Predicting Insider Threats
    Axelrad, Elise T.
    Sticha, Paul J.
    Brdiczka, Oliver
    Shen, Jianqiang
    IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 82 - 89