[1] Schultz E. A Framework for Understanding and Predicting Insider Attacks[J]. Computer and Security, 2002, 21(6): 526-531.
[2] 中国电信网络安全实验室. 云计算安全技术与应用[M]. 北京: 电子工业出版社, 2012.
[3] Greitzer F L, Moore A P, Cappelli D M, et al. Combating the Insider Cyber Threat[J]. IEEE Security and Privacy, 2008, 6(1): 61-64.
[4] Lee W, Stolfo S, Chan P, et al. Real Time Data Mining-based Intrusion Detection[C]//Proceedings of the 2001 DARPA Information Survivability Conference and Exposition Ⅱ. Los Alamito: IEEE Computer Society, 2001: 89-100.
[5] Singhal A. Data Warehousing and Data Mining Techniques for Computer Security[M]. New York: Springer-Verlag, 2006: 83-103.
[6] Ertoz L, Eilertson E, Lazarevic A, et al. MINDS-Minnesota Intrusion Detection System[C]//Next Generation Data Mining. New York: MIT/AAAI Press, 2004: 65-86.
[7] Buford J, Lewis L, Jakobson G. Insider Threat Detection Using Situation-aware MAS[C]//Proceedings of the 11th International Conference on Information Fusion. Piscataway: IEEE Press, 2008.
[8] Wang Hui, Liu Shufen, Zhang Xinjia. A Prediction Model of Insider Threat Based on Multi-agent[C]//Proceedings of the 1st International Symposium on Pervasive Computing and Applications. Piscataway: IEEE Computer Society, 2006: 273-278.
[9] Anderson D, Lunt T, Javitz H, et al, Detecting Unusual Program Behavior Using the Statistical Component of the Next Generation Intrusion Detection Expert System (NIDES)[R/OL]. [2012-10-07]. http://www.sd1.sri.com/papers/5sri/5sri.pdf.
[10] Santos E, Nguyen H, Yu F, et al. Intent-driven Insider Threat Detection in Intelligence Analyses[C]//Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology. Piscataway: IEEE Computer Society, 2008: 345-349.
[11] Mathew S, Upadhyaya S, Ha D, et al. Insider Abuse Comprehension through Capability Acquisition Graphs[C]//Proceedings of the 11th International Conference on Information Fusion. Piscataway: IEEE Computer Society, 2008: 4632279.
[12] 张红斌, 裴庆祺, 马建峰. 一种实时内部威胁模型建立方法[J]. 西安电子科技大学学报, 2009, 36(1): 80-86.
Zhang Hongbin, Peiqingqi, Ma Jianfeng. Method for Building the Real Time Insider Threat Model[J]. Journal of Xidian University, 2009, 36(1): 80-86.
[13] Birget J C, Zou X, Noubir G, et al. Hierarchy-based Access Control in Distributed Environments[C]//Proceedings of 2001 IEEE International Conference on Communications. Piscataway: IEEE, 2001: 229-233.
[14] 张红斌, 裴庆祺, 马建峰. 内部威胁云模型感知算法[J]. 计算机学报, 2009, 32(4): 784-792.
Zhang Hongbin, Pei Qingqi, Ma Jianfeng. An Algorithm for Sensing Insider Threat Based on Cloud Model[J]. Chinese Journal of Computers, 2009, 32(4): 784-792. |