Inside the Insider Threat (Introduction)

被引:0
|
作者
Bishop, Matt [1 ]
Nance, Kara [2 ]
Claycomb, William [3 ]
机构
[1] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[2] Univ Alaska Fairbanks, Dept Comp Sci, Fairbanks, AK USA
[3] Carnegie Mellon Univ, Inst Software Engn, Pittsburgh, PA 15213 USA
关键词
D O I
10.1109/HICSS.2016.342
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:2728 / 2728
页数:1
相关论文
共 50 条
  • [41] Review on Insider Threat Detection Techniques
    Oladimeji, T. O.
    Ayo, C. K.
    Adewumi, S. E.
    3RD INTERNATIONAL CONFERENCE ON SCIENCE AND SUSTAINABLE DEVELOPMENT (ICSSD 2019): SCIENCE, TECHNOLOGY AND RESEARCH: KEYS TO SUSTAINABLE DEVELOPMENT, 2019, 1299
  • [42] The insider threat to nuclear safety and security
    Andrew N Healey
    Security Journal, 2016, 29 : 23 - 38
  • [43] Insider Threat Detection and Cloud Computing
    Choudhary, Arjun
    Bhadada, Rajesh
    ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 81 - 90
  • [44] Scalable predicting model for insider threat
    College of Computer Science and Technology, Jilin University, Changchun 130012, China
    不详
    Jisuanji Xuebao, 2006, 8 (1346-1355):
  • [45] Towards a theory of insider threat assessment
    Chinchani, R
    Iyer, A
    Ngo, HQ
    Upadhyaya, S
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 108 - 117
  • [46] Insider Threat Identification by Process Analysis
    Bishop, Matt
    Conboy, Heather M.
    Phan, Huong
    Simidchieva, Borislava I.
    Avrunin, George S.
    Clarke, Lori A.
    Osterweil, Leon J.
    Peisert, Sean
    2014 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW 2014), 2014, : 251 - 264
  • [47] Data theft: A prototypical insider threat
    McCormick, Michael
    INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 53 - 68
  • [48] The Dynamic Nature of Insider Threat Indicators
    Frank L. Greitzer
    Justin Purl
    SN Computer Science, 2022, 3 (2)
  • [49] Analytics for early detection of insider threat
    Fenstermacher, Laurie
    Larson, Kathleen
    Vitiello, Christine
    Shellman, Steve
    Levey, Brian
    SIGNAL PROCESSING, SENSOR/INFORMATION FUSION, AND TARGET RECOGNITION XXXI, 2022, 12122
  • [50] Detecting Unknown Insider Threat Scenarios
    Young, William T.
    Memory, Alex
    Goldberg, Henry G.
    Senator, Ted E.
    2014 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW 2014), 2014, : 277 - 288