[ Publications about 'Insider Threat' ]

Articles in journals or book chapters (5)
  1. Pablo Moriano, Jared Pendleton, Steven Rich, and L. Jean Camp. Stopping the Insider at the Gates: Protecting Organizational Assets Through Graph Mining. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 9(1):4--29, 2018.
    Keywords: Insider Threat. [bibtex-entry]

  2. Debin Liu, Ninghui Li, XiaoFeng Wang, and L. Jean Camp. Beyond Risk-Based Access Control: Towards Incentive-Based Access Control. Financial Cryptography and Data Security, pp 102--112, 2012.
    Note: Springer Berlin/Heidelberg.
    Keywords: Insider Threat. [bibtex-entry]

  3. Debin Liu, Ninghui Li, XiaoFeng Wang, and L. Jean Camp. Security Risk Management using Incentives. IEEE Security and Privacy, 2011.
    Note: IEEE Computer Society.
    Keywords: Economics of Security, Insider Threat. [bibtex-entry]

  4. Debin Liu, L. Jean Camp, XiaoFeng Wang, and Lusha Wang. Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 1(1):29--45, 2010.
    Keywords: Economics of Security, Insider Threat. [bibtex-entry]

  5. Debin Liu, XiaoFeng Wang, and L. Jean Camp. Game-theoretic modeling and analysis of insider threats. International Journal of Critical Infrastructure Protection, 1:75--80, 2008.
    Note: Elsevier.
    Keywords: Economics of Security, Insider Threat. [bibtex-entry]

Conference publications (2)
  1. Pablo Moriano, Jared Pendleton, Steven Rich, and L. Jean Camp. Insider Threat Event Detection in User-System Interactions. In 9th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Dallas, TX, USA, pages 1--12, 2017.
    Keywords: Insider Threat. [bibtex-entry]

  2. L. Jean Camp. Hardening the Network from the Friend Within. In Information Security and Privacy, pages 249--249, 2009. Springer.
    Keywords: Insider Threat. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Nov 7 18:21:17 2022
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House