Author:
Yang Jeong,Velez David,Staley Harry,Mathew Navin,Daniel De Leon
Publisher
Springer International Publishing
Reference6 articles.
1. What is privilege escalation and why is it important? (2019). Retrieved from https://www.netsparker.com/blog/web-security/privilege-escalation/
2. Introduction to reconnaissance. (2019). Retrieved from https://www.hackingloops.com/introduction-to-reconnaissance-part-1-terms-and-methods/
3. INFOSEC: Top 10 Network Recon Tools. (2019). Retrieved from https://resources.infosecinstitute.com/category/certifications-training/ethical-hacking/network-recon/#gref
4. E. Shein, Companies proactively seek out internal threats. Commun. ACM 58(11), 15–17 (2015). https://doi.org/10.1145/2820423
5. T. Senator, E. Chow, I. Essa, J. Jones, V. Bettadapura, D.H. Chau, O. Green, O. Kaya, A. Zakrzewska, E. Briscoe, R. Mappus, H. Goldberg, R. Mccoll, L. Weiss, T. Dietterich, A. Fern, W.--K. Wong, S. Das, A. Emmott, D. Bader, Detecting insider threats in a real corporate database of computer usage activity, 1393 (2013). https://doi.org/10.1145/2487575.2488213