Author:
Kandias Miltiadis,Virvilis Nikos,Gritzalis Dimitris
Publisher
Springer Berlin Heidelberg
Reference32 articles.
1. Theoharidou, M., Kokolakis, S., Karyda, M., Kiountouzis, E.: The insider threat to Information Systems and the effectiveness of ISO 17799. Computers & Security 24(6), 472–484 (2005)
2. Bishop, M., Gates, C.: Defining the Insider Threat. In: Proc. of the 4th Annual Workshop on Cyber Security and Information Intelligence Research, Tennessee, vol. 288 (2008)
3. Shaw, E., Ruby, K., Post, J.: The insider threat to information systems: The psychology of the dangerous insider. Security Awareness Bulletin 2, 1–10 (1988)
4. UCB/EECS-2009-28;M. Armbrust,2009
5. Kandias, M., Mylonas, A., Theoharidou, M., Gritzalis, D.: Exploitation of auctions for outsourcing security-critical projects. In: Proc. of the 16th IEEE Symposium on Computers and Communications (ISCC 2011), Greece (2011)
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing Electronic Health Records from Insider Threats in Smart City Healthcare Cloud Using Machine Learning Approach;2024 5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV);2024-03-11
2. OsirisBFT: Say No to Task Replication for Scalable Byzantine Fault Tolerant Analytics;Proceedings of the 29th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming;2024-02-20
3. A Canary in the Voting Booth: Attacks on a Virtual Voting Machine;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2024
4. A Review on Effective Detection and Prevention for DDOS Attack in Cloud Virtual Environment Using Honeypot;2023 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS);2023-11-03
5. Insider Threat Detection and Cloud Computing;Advances in Data and Information Sciences;2022