최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기KSII Transactions on internet and information systems : TIIS, v.12 no.4, 2018년, pp.1887 - 1898
Kim, Dong-Wook (Department of Computer Engineering, University of Gachon) , Hong, Sung-Sam (Department of Computer Engineering, University of Gachon) , Han, Myung-Mook (Department of Computer Engineering, University of Gachon)
In this paper, a method to classify insider threat activity is introduced. The internal threats help detecting anomalous activity in the procedure performed by the user in an organization. When an anomalous value deviating from the overall behavior is displayed, we consider it as an inside threat fo...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Anderson, Robert H., and Richard Brackney, "Understanding the insider threat," in Proc. of a March 2004 Workshop, 2004. https://www.rand.org/pubs/conf_proceedings/CF196.html
Eldardiry, Hoda, et al., "Multi-domain information fusion for insider threat detection," Security and Privacy Workshops (SPW), 2013 IEEE. IEEE, p. 45-51. 2013.
Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo, "A Survey of Insider Attack Detection Research," Insider Attack and Cyber Security Advances in Information Security, 2008
Liu, A., et al. "A comparison of system call feature for insider threat detection," in Proc. of the 6th Annual IEEE Systems, Man & Cybernetics, Information Assurance Workshop. p. 341-347. 2005.
Chen, You, and Bradley Malin, "Detection of anomalous insiC in collaborative environments via relational analysis of access logs," in Proc. of the first ACM conference on Data and application security and privacy. ACM, p. 63-74. 2011.
Grinstead, Charles Miller, and James Laurie Snell. "Introduction to probability." American Mathematical Soc., p.405-469. 2012.
http://www.cert.org/insider-threat/tools/index.cfm
Eberle, William, Jeffrey Graves, and Lawrence Holder, "Insider threat detection using a graph-based approach." Journal of Applied Security Research 6.1 p32-81. 2010.
Wen-Hua Ju and Yehuda Vardi, "A hybrid high-order markov chain model for computer intrusion detection," Journal of Computational and Graphical Statistics, June, p 277-295, 2001.
Dawn M. Cappelli, Andrew P. Moore, Randall F. Trzeciak, "The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)," Addison-Wesley Professional, 2012. https://resources.sei.cmu.edu/library/asset-view.cfm?assetid30310
Y. Liao and V. R. Vemuri, "Using Text Categorization Techniques for Intrusion Detection," 11 USENIX Security Symposium, 2002. https://dl.acm.org/citation.cfm?id720290
Cortes, C., Vapnik, V., "Support-vector networks," Machine Learning, 20 (3): 273, 1995.
Press, William H., Teukolsky, Saul A., Vetterling, William T., Flannery, B. P. Section 16.5. Support Vector Machines. Numerical Recipes: The Art of Scientific Computing 3 Edition. New York: Cambridge University Press. 2007.
STOLFO, Salvatore J., et al., "A comparative evaluation of two algorithms for windows registry anomaly detection," Journal of Computer Security, 13.4: 659-693. 2005.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.