Inside the Insider Threat (Introduction)

被引:0
|
作者
Bishop, Matt [1 ]
Nance, Kara [2 ]
Claycomb, William [3 ]
机构
[1] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[2] Univ Alaska Fairbanks, Dept Comp Sci, Fairbanks, AK USA
[3] Carnegie Mellon Univ, Inst Software Engn, Pittsburgh, PA 15213 USA
关键词
D O I
10.1109/HICSS.2016.342
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:2728 / 2728
页数:1
相关论文
共 50 条
  • [21] Combating the insider cyber threat
    Greitzer, Frank L.
    Moore, Andrew P.
    Cappelli, Dawn M.
    Andrews, Dee H.
    Carroll, Lynn A.
    Hull, Thomas D.
    IEEE SECURITY & PRIVACY, 2008, 6 (01) : 61 - 64
  • [22] An Insider Threat Prediction Model
    Kandias, Miltiadis
    Mylonas, Alexios
    Virvilis, Nikos
    Theoharidou, Marianthi
    Gritzalis, Dimitris
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 26 - 37
  • [23] Guarding Against the Insider Threat
    Archuleta, Edmund G.
    JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2009, 101 (05): : 38 - +
  • [24] Honeypots: Catching the insider threat
    Spitzner, L
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 170 - 179
  • [25] Insider Threat Detection in PRODIGAL
    Goldberg, Henry G.
    Young, William T.
    Reardon, Matthew G.
    Phillips, Brian J.
    Senator, Ted E.
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2648 - 2657
  • [26] Safeguarding against the insider threat
    Bulpett B.
    Network Security, 2020, 2020 (06): : 14 - 17
  • [27] Balancing the insider and outsider threat
    Walton, Richard
    Limited, Walton-Mackenzie
    Computer Fraud and Security, 2006, 2006 (11): : 8 - 11
  • [28] A Method of Evaluation for Insider Threat
    Wang, Yi-Lu
    Yang, Sang-Chin
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 438 - 441
  • [29] Survival analysis for insider threat Detecting insider threat incidents using survival analysis techniques
    Alhajjar, Elie
    Bradley, Taylor
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2022, 28 (04) : 335 - 351
  • [30] Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
    Legg, Philip A.
    Buckley, Oliver
    Goldsmith, Michael
    Creese, Sadie
    2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,