Author:
Chen Taolue,Kammüller Florian,Nemli Ibrahim,Probst Christian W.
Publisher
Springer International Publishing
Reference10 articles.
1. Axelrad, E.T., Sticha, P.J., Brdiczka, O., Shen, J.: A bayesian network model for predicting insider threats. In: 2013 IEEE Security and Privacy Workshops, pp. 82–89. IEEE Computer Society, Los Alamitos (2013)
2. Boender, J., Ivanova, M.G., Kammüller, F., Primiero, G.: Modeling human behaviour with higher order logic: Insider threats. In: STAST 2014. IEEE (2014). co-located with CSF’14 in the Vienna Summer of Logic
3. Cappelli, D.M., Moore, A.P., Trzeciak, R.F.: The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). SEI Series in Software Engineering, 1st edn. Addison-Wesley Professional, Boston (2012)
4. Heckerman, D.: A tutorial on learning with bayesian networks. In: Jordan, M. (ed.) Learning in Graphical Models. MIT Press, Cambridge (1999)
5. Kissel, R.: Glossary of key information security terms. Technical report NISTIR 7298 Revision 2, National Institute of Standards and Technology (2013)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献