Author:
Yaseen Qussai,Panda Brajendra
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference20 articles.
1. Brackney, R., Anderson, R.: Understanding the insider threat. In: 2004 workshop, Technical report, RAND Corporation (2004)
2. Gordon, L., Loeb, M., Lucyshyn, W., Richardson, R.: Computer crime and security survey, http://www.cpppe.umd.edu/Bookstore/Documents/2005CSISurvey.pdf
3. Yaseen, Q., Panda, B.: Knowledge acquisition and insider threat prediction in relational database systems. In: The International Workshop on Software Security Processes (2009)
4. Yaseen, Q., Panda, B.: Prediciting and preventing insider threat in relational databases. In: 4th Workshop on Information Security Theory and Practice (2010)
5. Chagarlamudi, M., Panda, B., Hu, Y.: Insider threat in database systems: preventing malicious users’ activities in databases’. In: 6th International Conference on Information Technology (2009)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献