Catalog

Record Details

Catalog Search



Insider Attack and Cyber Security Beyond the Hacker  Cover Image E-book E-book

Insider Attack and Cyber Security [electronic resource] : Beyond the Hacker / edited by Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair.

Stolfo, Salvatore J. (editor.). Bellovin, Steven M. (editor.). Keromytis, Angelos D. (editor.). Hershkop, Shlomo. (editor.). Smith, Sean W. (editor.). Sinclair, Sara. (editor.). SpringerLink (Online service) (Added Author).

Electronic resources


The insider attack problem nature and scope
Reflections on the insider threat
The "big picture" of insider IT sabotage across U.S. critical infrastructures
Data theft : a prototypical insider threat
A survey of insider attack detection research
Naive Bayes as a masquerade detector : addressing a chronic failure
Towards a virtualization-enabled framework for information traceability (VFIT)
Reconfigurable tamper-resistant hardware support against insider threats : the trusted ILLIAC approach
Surviving insider attacks : a call for system experiments
Preventative directions for insider threat mitigation via access control
Taking stock and looking forward: an outsider's perspective on the insider threat
Research challenges for fighting insider threat in the financial services industry
Hard problems and research challenges concluding remarks.

Additional Resources