Insider Attack and Cyber Security [electronic resource] : Beyond the Hacker / edited by Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair.
Record details
- ISBN: 9780387773223
- Physical Description: online resource.
- Publisher: Boston, MA : Springer US, 2008.
Search for related items by subject
Search for related items by series
Electronic resources
| The insider attack problem nature and scope | ||
| Reflections on the insider threat | ||
| The "big picture" of insider IT sabotage across U.S. critical infrastructures | ||
| Data theft : a prototypical insider threat | ||
| A survey of insider attack detection research | ||
| Naive Bayes as a masquerade detector : addressing a chronic failure | ||
| Towards a virtualization-enabled framework for information traceability (VFIT) | ||
| Reconfigurable tamper-resistant hardware support against insider threats : the trusted ILLIAC approach | ||
| Surviving insider attacks : a call for system experiments | ||
| Preventative directions for insider threat mitigation via access control | ||
| Taking stock and looking forward: an outsider's perspective on the insider threat | ||
| Research challenges for fighting insider threat in the financial services industry | ||
| Hard problems and research challenges concluding remarks. |