Author:
Yaseen Qussai,Panda Brajendra
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Brackney, R., Anderson, R.: Understanding the insider threat. In: Proceedings of a march 2004 workshop. Technical report, RAND Corporation, Santa Monica, CA (2004)
2. Gordon, L., Loeb, M., Lucyshyn, W., Richardson, R.: Computer Crime and Security Survey, http://www.cpppe.umd.edu/Bookstore/Documents/2005CSISurvey.pdf
3. Yaseen, Q., Panda, B.: Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems. In: Proceedings of the International Workshop on Software Security Processes, Vancouver, Canada, pp. 450–455 (2009)
4. Chagarlamudi, M., Panda, B., Hu, Y.: Insider Threat in Database Systems: Preventing Malicious Users’ Activities in Databases. In: Proceedings of the 2009 Sixth International Conference on Information Technology: New Generation, Las Vegas, pp. 1616–1620 (2009)
5. Bishop, M., Gates, C.: Defining the Insider Threat. In: Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research, Tennessee, vol. 288 (2008)
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献