Principles-driven forensic analysis
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Analysis of Computer Intrusions Using Sequences of Function Calls
IEEE Transactions on Dependable and Secure Computing
IMSA'07 IASTED European Conference on Proceedings of the IASTED European Conference: internet and multimedia systems and applications
An extensible analysable system model
Information Security Tech. Report
EurolMSA '07 Proceedings of the Third IASTED European Conference on Internet and Multimedia Systems and Applications
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Insiders behaving badly: addressing bad actors and their actions
IEEE Transactions on Information Forensics and Security
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
A data-centric approach to insider attack detection in database systems
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Hi-index | 0.00 |
The "insider problem" is considered the most difficult and critical problem in computer security. But studies that survey the seriousness of the problem, and research that analyzes the problem, rarely define the problem precisely. Implicit definitions vary in meaning. Different definitions imply different countermeasures, as well as different assumptions.