default search action
Insider Threats in Cyber Security 2010
- Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop:
Insider Threats in Cyber Security. Advances in Information Security 49, Springer 2010, ISBN 978-1-4419-7132-6 - Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop:
Aspects of Insider Threats. 1-15 - Peter G. Neumann:
Combatting Insider Threats. 17-44 - Lizzie Coles-Kemp, Marianthi Theoharidou:
Insider Threat and Information Security Management. 45-71 - Ulrich Flegel, Julien Vayssière, Gunter Bitz:
A State of the Art Survey of Fraud Detection Technology. 73-84 - Frank L. Greitzer, Deborah A. Frincke:
Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation. 85-113 - Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, Sean Whalen:
A Risk Management Approach to the "Insider Threat". 115-137 - Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, Frank Leymann:
Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. 139-171 - Jason Crampton, Michael Huth:
Towards an Access-Control Framework for Countering Insider Threats. 173-195 - Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo:
Monitoring Technologies for Mitigating Insider Threats. 197-217 - George Magklaras, Steven Furnell:
Insider Threat Specification as a Threat Mitigation Technique. 219-244
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.