Accumulating evidence of insider attacks

H. Chivers, P. Nobles, Siraj A. Shaikh, J.A. Clark, H. Chen

    Research output: Chapter in Book/Report/Conference proceedingChapter

    6 Citations (Scopus)
    42 Downloads (Pure)
    Original languageEnglish
    Title of host publicationProceedings of the 1st International Workshop on Managing Insider Security Threats (MIST-2009)
    EditorsD. Chadwick, I. You, H.B. Chang
    PublisherCEUR
    Pages34-50
    Publication statusPublished - 2009

    Bibliographical note

    Paper presented at the 1st International Workshop on Managing Insider Security Threats (MIST-2009), Purdue University, West Lafayette, USA, June 15-19, 2009.
    Copyright © 2009 for the individual papers by the papers' authors. Copying permitted for private and academic purposes. Re-publication of material from this volume requires permission by the copyright owners. This volume is published by its editors

    Keywords

    • insider attacks
    • security
    • detection

    Cite this