default search action
Search dblp for Publications
export results for "toc:db/series/ais/ais39.bht:"
@incollection{DBLP:series/ais/Bellovin08, author = {Steven M. Bellovin}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {The Insider Attack Problem Nature and Scope}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {1--4}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_1}, doi = {10.1007/978-0-387-77322-3\_1}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/Bellovin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/GligorC08, author = {Virgil D. Gligor and C. Sekar Chandersekaran}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Surviving Insider Attacks: {A} Call for System Experiments}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {153--164}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_9}, doi = {10.1007/978-0-387-77322-3\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/GligorC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Hunker08, author = {Jeffrey Hunker}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {195--214}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_11}, doi = {10.1007/978-0-387-77322-3\_11}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Hunker08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/IyerDNK08, author = {Ravishankar K. Iyer and Paul Dabrowski and Nithin Nakka and Zbigniew Kalbarczyk}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted {ILLIAC} Approach}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {133--152}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_8}, doi = {10.1007/978-0-387-77322-3\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/IyerDNK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Keromytis08, author = {Angelos D. Keromytis}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Hard Problems and Research Challenges}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {215--218}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_12}, doi = {10.1007/978-0-387-77322-3\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Keromytis08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Keromytis08a, author = {Angelos D. Keromytis}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Hard Problems and Research Challenges Concluding Remarks}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {219--222}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_13}, doi = {10.1007/978-0-387-77322-3\_13}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Keromytis08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KillourhyM08, author = {Kevin S. Killourhy and Roy A. Maxion}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {91--112}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_6}, doi = {10.1007/978-0-387-77322-3\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KillourhyM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/McCormick08, author = {Michael McCormick}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Data Theft: {A} Prototypical Insider Threat}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {53--68}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_4}, doi = {10.1007/978-0-387-77322-3\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/McCormick08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/MooreCT08, author = {Andrew P. Moore and Dawn M. Cappelli and Randall F. Trzeciak}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {The "Big Picture" of Insider {IT} Sabotage Across {U.S.} Critical Infrastructures}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {17--52}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_3}, doi = {10.1007/978-0-387-77322-3\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/MooreCT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Pfleeger08, author = {Charles P. Pfleeger}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Reflections on the Insider Threat}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {5--16}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_2}, doi = {10.1007/978-0-387-77322-3\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Pfleeger08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SahitaS08, author = {Ravi Sahita and Uday R. Savagaonkar}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Towards a Virtualization-enabled Framework for Information Traceability {(VFIT)}}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {113--132}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_7}, doi = {10.1007/978-0-387-77322-3\_7}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SahitaS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SalemHS08, author = {Malek Ben Salem and Shlomo Hershkop and Salvatore J. Stolfo}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {A Survey of Insider Attack Detection Research}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {69--90}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_5}, doi = {10.1007/978-0-387-77322-3\_5}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SalemHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SinclairS08, author = {Sara Sinclair and Sean W. Smith}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Preventative Directions For Insider Threat Mitigation Via Access Control}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {165--194}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_10}, doi = {10.1007/978-0-387-77322-3\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SinclairS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/39, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3}, doi = {10.1007/978-0-387-77322-3}, isbn = {978-0-387-77321-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/39.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.