


default search action
Insider Threats in Cyber Security 2010
- Christian W. Probst

, Jeffrey Hunker, Dieter Gollmann, Matt Bishop
:
Insider Threats in Cyber Security. Advances in Information Security 49, Springer 2010, ISBN 978-1-4419-7132-6 - Christian W. Probst

, Jeffrey Hunker, Dieter Gollmann, Matt Bishop
:
Aspects of Insider Threats. 1-15 - Peter G. Neumann:

Combatting Insider Threats. 17-44 - Lizzie Coles-Kemp, Marianthi Theoharidou

:
Insider Threat and Information Security Management. 45-71 - Ulrich Flegel, Julien Vayssière, Gunter Bitz:

A State of the Art Survey of Fraud Detection Technology. 73-84 - Frank L. Greitzer, Deborah A. Frincke:

Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation. 85-113 - Matt Bishop

, Sophie Engle
, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert
, Sean Whalen:
A Risk Management Approach to the "Insider Threat". 115-137 - Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker

, Frank Leymann
:
Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. 139-171 - Jason Crampton, Michael Huth:

Towards an Access-Control Framework for Countering Insider Threats. 173-195 - Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo:

Monitoring Technologies for Mitigating Insider Threats. 197-217 - George Magklaras

, Steven Furnell
:
Insider Threat Specification as a Threat Mitigation Technique. 219-244

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














