Author:
Ben Salem Malek,Stolfo Salvatore J.
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Ben-Salem, M.: DDA Sensor,
http://www1.cs.columbia.edu/ids/ruu/data/
2. Ben-Salem, M., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. In: Insider Attack and Cyber Security: Beyond the Hacker. Springer, Heidelberg (2008)
3. Bowen, B., and Hershkop, S. Decoy.: Document Distributor,
http://sneakers.cs.columbia.edu/ids/ruu/dcubed/
4. Bowen, B.M., Hershkop, S., Keromytis, A.D., Stolfo, S.J.: Baiting inside attackers using decoy documents. In: SecureComm 2009: Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks (2009)
5. Chinchani, R., Upadhyaya, S., Kwiat, K.: A tamper-resistant framework for unambiguous detection of attacks in user space using process monitors. In: Proceedings of First IEEE International Workshop on Information Assurance (IWIAS 2003), pp. 25–34 (2003)
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Application Layer Cyber Deception Without Developer Interaction;2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2024-07-08
2. Honeyfile Camouflage: Hiding Fake Files in Plain Sight;Proceedings of the 3rd ACM Workshop on the Security Implications of Deepfakes and Cheapfakes;2024-07
3. Knocking on Admin’s Door: Protecting Critical Web Applications with Deception;Lecture Notes in Computer Science;2024
4. File Tracking and Visualization Methods Using a Network Graph to Prevent Information Leakage;IEICE Transactions on Information and Systems;2023-09-01
5. Insider Intrusion Detection Techniques: A State-of-the-Art Review;Journal of Computer Information Systems;2023-02-14