Inside the Insider Threat (Introduction)

被引:0
|
作者
Bishop, Matt [1 ]
Nance, Kara [2 ]
Claycomb, William [3 ]
机构
[1] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[2] Univ Alaska Fairbanks, Dept Comp Sci, Fairbanks, AK USA
[3] Carnegie Mellon Univ, Inst Software Engn, Pittsburgh, PA 15213 USA
关键词
D O I
10.1109/HICSS.2016.342
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:2728 / 2728
页数:1
相关论文
共 50 条
  • [31] Inside the threat
    Bertrand, Didier
    FRENCH REVIEW, 2020, 94 (02): : 242 - 242
  • [32] Insider Threat Program Best Practices
    Guido, Mark D.
    Brooks, Marc W.
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1831 - 1839
  • [33] Cybercrime Countermeasure of Insider Threat Investigation
    Kao, Da-Yu
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 413 - 418
  • [34] Aspectising honeytokens to contain the insider threat
    Padayachee, Keshnee
    IET INFORMATION SECURITY, 2015, 9 (04) : 240 - 247
  • [35] Weak models for insider threat detection
    Thompson, P
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE(C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE III, PTS 1 AND 2, 2004, 5403 : 40 - 48
  • [36] The insider threat to nuclear safety and security
    Healey, Andrew N.
    SECURITY JOURNAL, 2016, 29 (01) : 23 - 38
  • [37] Modeling the emergence of insider threat vulnerabilities
    Martinez-Moyano, Ignacio J.
    Rich, Eliot H.
    Conrad, Stephen H.
    Andersen, David F.
    PROCEEDINGS OF THE 2006 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2006, : 562 - +
  • [38] Contrastive Learning for Insider Threat Detection
    Vinay, M. S.
    Yuan, Shuhan
    Wu, Xintao
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2022, PT I, 2022, : 395 - 403
  • [39] BALANCING OUR APPROACH TO THE INSIDER THREAT
    Franz, David R.
    LeDuc, James W.
    BIOSECURITY AND BIOTERRORISM-BIODEFENSE STRATEGY PRACTICE AND SCIENCE, 2011, 9 (03) : 205 - 206
  • [40] Cybersecurity: Revisiting the definition of insider threat
    Beebe, Nicole Lang
    Chang, Frederick R.
    Bridge, 1600, 49 (03): : 12 - 19