Journal of Artificial Intelligence and Soft Computing Research > 2012 > Vol. 2, No. 1 > 31--41
Source
Abstract
Identifiers
journal ISSN : | 2083-2567 |
journal e-ISSN : | 2449-6499 |
Authors
Keywords
Additional information
Publisher
Fields of science
Bibliography
-
[1] M. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore, Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, CERT and the National Threat Assessment Center, Aug. 2004.
-
[2] N. Nguyen, P. Reiher, and G. Kuenning, Detecting Insider Threats by Monitoring System Call Activity, In: Proceedings of 2003 IEEE Information Assurance Workshop, 2003.
-
[3] H. Cavusoglu, B. Misra, and S. Raghunathan, Optimal Configuration of Intrusion Detection Systems, In: Proceedings of Second Secure Knowledge Management Workshop, 2006.