The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for insider with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1998 (17) 1999-2001 (17) 2002-2003 (18) 2004 (18) 2005 (44) 2006 (40) 2007 (67) 2008 (78) 2009 (60) 2010 (45) 2011 (47) 2012 (57) 2013 (55) 2014 (47) 2015 (62) 2016 (78) 2017 (93) 2018 (86) 2019 (67) 2020 (91) 2021 (80) 2022 (79) 2023 (63) 2024 (13)
Publication types (Num. hits)
article(500) book(5) incollection(29) inproceedings(762) phdthesis(20) proceedings(6)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 276 occurrences of 183 keywords

Results
Found 1322 publication records. Showing 1322 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
116Debin Liu, XiaoFeng Wang 0001, L. Jean Camp Mitigating Inadvertent Insider Threats with Incentives. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Incentive Engineering, Game Theory, Insider Threat, Human Subject
93Bert Valenzuela The insider: the web site that brought Mesa's williams campus together. Search on Bibsonomy SIGUCCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Arizona State University, IIS, Williams Campus, active desktop, insider, collaboration, database, web, participation, intranet, channel, ASP, newspaper
82Chik How Tan Signcryption Scheme in Multi-user Setting without Random Oracles. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF decisional bilinear Diffie-Hellman assumption, Signcryption
73Robert Willison, Mikko T. Siponen Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
73Kevin S. Killourhy, Roy A. Maxion Toward Realistic and Artifact-Free Insider-Threat Data. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
73Suranjan Pramanik, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya Security Policies to Mitigate Insider Threat in the Document Control Domain. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
70William R. Claycomb, Dongwan Shin Detecting insider activity using enhanced directory virtualization. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
70Dawn M. Cappelli Using empirical insider threat case data to design a mitigation strategy. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
70Suraj Nellikar, David M. Nicol, Jai J. Choi Role-based differentiation for insider detection algorithms. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
69Steve Donoho Early detection of insider trading in option markets. Search on Bibsonomy KDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF insider trading, data mining, fraud detection, behavior detection
61Hui Wang 0071, Heli Xu, Bibo Lu, Zihao Shen Research on Security Architecture for Defending Insider Threat. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
61Chik How Tan Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
61Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo 0001, Shambhu J. Upadhyaya Towards a Theory of Insider Threat Assessment. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
61Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin Developing an Insider Threat Model Using Functional Decomposition. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
58L. Jean Camp Hardening the Network from the Friend Within. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
58Dick Brackney, Terrance Goan, Allen Ott, Lockheed Martin The Cyber Enemy Within ... Countering the Threat from Malicious Insiders. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
58Ignacio J. Martinez-Moyano, Eliot H. Rich, Stephen H. Conrad, David F. Andersen, Thomas R. Stewart A behavioral theory of insider-threat risks: A system dynamics approach. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF behavioral theory, judgment and decision making, signal detection theory, system dynamics modeling, risk, security modeling, Insider threat, policy analysis
58Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo 0001, Suranjan Pramanik, Ramkumar Chinchani, Sunu Mathew Insider Threat Analysis Using Information-Centric Modeling. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF capability acquisition graphs, key challenge graphs, Insider threats
58Daniel A. Ray, Phillip G. Bradford An Integrated System for Insider Threat Detection. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proactive forensics, anomaly detection, Insider threats
58Michael D. Carroll Information security: examining and managing the insider threat. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF insider threat
58Jonathan Katz, Ji Sun Shin Modeling insider attacks on group key-exchange protocols. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF universal composability, group key exchange, insider attacks
58Yang Yu, Tzi-cker Chiueh Display-only file server: a solution against information theft due to insider attack. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF information theft, access, digital rights management, insider attack
56Ehab Al-Shaer, Brent Lagesse, Craig A. Shue (eds.) Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010 Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
56George Magklaras, Steven Furnell Insider Threat Specification as a Threat Mitigation Technique. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
56Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop Aspects of Insider Threats. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
56Lizzie Coles-Kemp, Marianthi Theoharidou Insider Threat and Information Security Management. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
56Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, Sean Whalen A Risk Management Approach to the "Insider Threat". Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
56Peter G. Neumann Combatting Insider Threats. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
56Brian M. Bowen, Malek Ben Salem 0001, Angelos D. Keromytis, Salvatore J. Stolfo Monitoring Technologies for Mitigating Insider Threats. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
56Frank L. Greitzer, Deborah A. Frincke Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
56Jason Crampton, Michael Huth 0001 Towards an Access-Control Framework for Countering Insider Threats. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
56Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst 10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response. Search on Bibsonomy Insider Threats: Strategies for Prevention, Mitigation, and Response The full citation details ... 2010 DBLP  BibTeX  RDF
56Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst 10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response. Search on Bibsonomy Insider Threats: Strategies for Prevention, Mitigation, and Response The full citation details ... 2010 DBLP  BibTeX  RDF
56John Tuttle, Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine Reverse engineering for mobile systems forensics with Ares. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
56Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici M-score: estimating the potential damage of data leakage incident by assigning misuseability weight. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
56Emil Stefanov, Mikhail Atallah Duress detection for authentication attacks against multiple administrators. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
56Ruj Akavipat, Apurv Dhadphale, Apu Kapadia, Matthew Wright 0001 ReDS: reputation for directory services in P2P systems. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
56Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici Detecting data misuse by applying context-based data linkage. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
56Sara Sinclair, Sean W. Smith Preventative Directions For Insider Threat Mitigation Via Access Control. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56Virgil D. Gligor, C. Sekar Chandersekaran Surviving Insider Attacks: A Call for System Experiments. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56Charles P. Pfleeger Reflections on the Insider Threat. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56Jeffrey Hunker Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56Steven M. Bellovin The Insider Attack Problem Nature and Scope. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56Malek Ben Salem 0001, Shlomo Hershkop, Salvatore J. Stolfo A Survey of Insider Attack Detection Research. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56Michael McCormick Data Theft: A Prototypical Insider Threat. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56Ravishankar K. Iyer, Paul Dabrowski, Nithin Nakka, Zbigniew Kalbarczyk Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56Andrew P. Moore, Dawn M. Cappelli, Randall F. Trzeciak The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann 08302 Summary - Countering Insider Threats. Search on Bibsonomy Countering Insider Threats The full citation details ... 2008 DBLP  BibTeX  RDF
56Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst 08302 Abstracts Collection - Countering Insider Threats. Search on Bibsonomy Countering Insider Threats The full citation details ... 2008 DBLP  BibTeX  RDF
49Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer Discovering Application-Level Insider Attacks Using Symbolic Execution. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Qussai Yaseen, Brajendra Panda Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Qutaibah Althebyan, Brajendra Panda A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49Eugene Santos Jr., Hien Nguyen 0001, Fei Yu 0002, Keum Joo Kim, Deqing Li, John Thomas Wilkinson, Adam Olson, Russell Jacob Intent-Driven Insider Threat Detection in Intelligence Analyses. Search on Bibsonomy IAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49Frederic Stumpf, Patrick Röder, Claudia Eckert 0001 An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Joon S. Park, Joseph Giordano Role-based profile analysis for scalable and accurate insider-anomaly detection. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Robert S. Garfinkel, Ram D. Gopal, Daniel O. Rice New Approaches to Disclosure Limitation While Answering Queries to a Database: Protecting Numerical Confidential Data against Insider Threat Based on Data or Algorithms. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49James S. Okolica, Gilbert L. Peterson, Robert F. Mills Using Author Topic to Detect Insider Threats from Email Traffic. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Joon S. Park, Joseph Giordano Access Control Requirements for Preventing Insider Threats. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Brian Vetter, Feiyi Wang, Shyhtsun Felix Wu An experimental study of insider attacks for OSPF routing protocol. Search on Bibsonomy ICNP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
47Wei Yu 0003, Zhu Ji, K. J. Ray Liu Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach Analysis of an Electronic Voting System. Search on Bibsonomy S&P The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Dattatraya S. Bhilare, Ashwini K. Ramani, Sanjay K. Tanwani Protecting intellectual property and sensitive information in academic campuses from trusted insiders: leveraging active directory. Search on Bibsonomy SIGUCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF audit automation, real time action, insider threat, active directory, user identification
43Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin Database Intrusion Detection Using Role Profiling with Role Hierarchy. Search on Bibsonomy Secure Data Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Role profiling, Intrusion detection, RBAC, Database security, Insider threats
43Dijiang Huang, Deep Medhi Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF node fabrication, selective node capture, Sensor, insider attack
43Kevin Borders, Xin Zhao 0016, Atul Prakash 0001 Securing sensitive content in a view-only file system. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2006 DBLP  DOI  BibTeX  RDF insider abuse, virtual machines, file systems, digital rights management, information leakage
41Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst (eds.) Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010 Search on Bibsonomy Insider Threats: Strategies for Prevention, Mitigation, and Response The full citation details ... 2010 DBLP  BibTeX  RDF
41Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, Frank Leymann Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
41Ulrich Flegel, Julien Vayssière, Gunter Bitz A State of the Art Survey of Fraud Detection Technology. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
41Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst (eds.) Countering Insider Threats, 20.07. - 25.07.2008 Search on Bibsonomy Countering Insider Threats The full citation details ... 2008 DBLP  BibTeX  RDF
41Ravi Sahita, Uday R. Savagaonkar Towards a Virtualization-enabled Framework for Information Traceability (VFIT). Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Angelos D. Keromytis Hard Problems and Research Challenges Concluding Remarks. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Angelos D. Keromytis Hard Problems and Research Challenges. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Kevin S. Killourhy, Roy A. Maxion Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Ulrich Flegel, Julien Vayssière, Gunter Bitz Fraud Detection from a Business Perspective: Future Directions and Challenges. Search on Bibsonomy Countering Insider Threats The full citation details ... 2008 DBLP  BibTeX  RDF
41Ulrich Flegel, Florian Kerschbaum, Richard Wacker Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality. Search on Bibsonomy Countering Insider Threats The full citation details ... 2008 DBLP  BibTeX  RDF
38Yu Zhang 0034, Xingshe Zhou 0001, Yee Wei Law, Marimuthu Palaniswami Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Frank L. Greitzer, Andrew P. Moore, Dawn M. Cappelli, Dee H. Andrews, Lynn A. Carroll, Thomas D. Hull Combating the Insider Cyber Threat. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Imad M. Abbadi, Muntaha Alawneh Preventing Insider Information Leakage for Enterprises. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Chik How Tan Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Signcryption KEM scheme, Signcryption Tag-KEM scheme
38Nan Zhang 0004, Wei Yu 0002, Xinwen Fu, Sajal K. Das 0001 Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. Search on Bibsonomy ICPADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Sanmay Das Learning to trade with insider information. Search on Bibsonomy ICEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF computational finance, market microstructure
38Luk Boral, Maria Disla, Shivraj Patil, Jari Williams, Joon S. Park Countering Insider Threats in Personal Devices. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Ignacio J. Martinez-Moyano, Eliot H. Rich, Stephen H. Conrad, David F. Andersen Modeling the emergence of insider threat vulnerabilities. Search on Bibsonomy WSC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Christian W. Probst, René Rydhof Hansen, Flemming Nielson Where Can an Insider Attack? Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Alexander W. Dent Hybrid Signcryption Schemes with Insider Security. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Dieter Gollmann Insider Fraud (Position Paper). Search on Bibsonomy Security Protocols Workshop The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
35Takahiro Matsuda 0002, Kanta Matsuura, Jacob C. N. Schuldt Efficient Constructions of Signcryption Schemes and Signcryption Composability. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-user security, signcryption, generic construction
34Yair Amir The insider threat in scalable distributed systems: algorithms, metrics and gaps. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed system, insider threat
32M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Group Key Exchange, Insider Attacks, Key Compromise Impersonation
32Xuejun Zhuo, Jianguo Hao, Duo Liu, Yiqi Dai Removal of misbehaving insiders in anonymous VANETs. Search on Bibsonomy MSWiM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF misbehaving insider, anonymity, VANET, revocation
32Aaron Walters, David Zage, Cristina Nita-Rotaru A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, adaptivity, overlay networks, insider attacks
32Manuel Barbosa, Pooya Farshim Certificateless signcryption. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF insider security, signcryption, certificateless
32Zhiyao Liang, Rakesh M. Verma Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF insider, authentication, formal method, cryptographic protocol, undecidability, secrecy
32Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya Inferring Sources of Leaks in Document Management Systems. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF information leaks, insider threat, Document management system
32Marcus A. Maloof, Gregory D. Stephens elicit: A System for Detecting Insiders Who Violate Need-to-Know. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly detection, insider threat, misuse
32C. Corzo, F. Corzo S., Ning Zhang 0001, Andy Carpenter Using Automated Banking Certificates to Detect Unauthorised Financial Transactions. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF financial fraud, Data integrity, Security architecture, Insider threats
32Wei-Chi Ku, Shuai-Min Chen Cryptanalysis of a flexible remote user authentication scheme using smart cards. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privileged insider's attack, reparability, user eviction, authentication, password
32Nazli Goharian, Ling Ma 0001 On off-topic access detection in information systems. Search on Bibsonomy CIKM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, detection, insider threat, unauthorized access, misuse
32Simon D. Byers, Lorrie Faith Cranor, David P. Kormann, Patrick D. McDaniel, Eric Cronin Analysis of security vulnerabilities in the movie production and distribution process. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF multimedia, policy, digital rights management, file sharing, physical security, insider attacks
Displaying result #1 - #100 of 1322 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license