사용자 직무와 활동패턴 기반의 내부자위협통합관리체계 설계

논문상세정보
' 사용자 직무와 활동패턴 기반의 내부자위협통합관리체계 설계' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • defaultpattern
  • private pattern
  • security scoring
  • 내부자 위협
  • 내부자위협통합관리체계(eitms)
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
6 0

0.0%

' 사용자 직무와 활동패턴 기반의 내부자위협통합관리체계 설계' 의 참고문헌

  • 침해사고 대응팀(CERT) 구축/운영 안내서
  • US cybercrime: Rising risks, reduced readiness: Key findings from the 2014US state of cybercrime survey
    PWC [2014]
  • Towards a conceptual model and reasoning structure for insider threat detection
    Legg, Philip Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 4 (4) : 20 ~ 37 [2013]
  • The CERT Guide to Insider Threats:How to Prevent, Detect, and Respond to Information Technology Crimes
    Cappelli, D. M. Addison-Wesley [2012]
  • Recent Advances in Intrusion Detection
    Salem, Malek Ben Springer Berlin Heidelberg [2011]
  • Manifestations of user personality in website choice and behaviour on online social networks
    Kosinski, M. Machine Learning 95 (3) : 357 ~ 380 [2014]
  • Linguistic inquiry and word count: LIWC 2001
    Pennebaker, James W Mahway: Lawrence Erlbaum Associates 71 [2001]
  • For mal Specification of Common Criteria Based A ccess Control Policy Model
    Singh, Manpreet IJ Network Secur ity 11 (3) : 139 ~ 148 [2010]
  • DLP방식의 문제점 극복을 위한 E-DRM 방식의 개인정보 보호 기술
    최종욱 정보보호학회논문지 22 (5) : 1103 ~ 1113 [2012]
  • Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation
    Greitzer, F. L. Insider Threats in Cyber Security : 85 ~ 113 [2010]
  • Access Control Log
  • A preliminary model of end user sophistication for insider threat prediction in IT systems
    Magklaras, G. B. Computers & Security 24 (5) : 371 ~ 380 [2005]
  • 2015 INSIDER THREAT REPORT
    [2015]
  • 2014 US State of Cybercrime Survey
    CERT [2014]