Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/series/ais/ais49.bht:"
@incollection{DBLP:series/ais/BishopEFGGPW10, author = {Matt Bishop and Sophie Engle and Deborah A. Frincke and Carrie Gates and Frank L. Greitzer and Sean Peisert and Sean Whalen}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {A Risk Management Approach to the "Insider Threat"}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {115--137}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_6}, doi = {10.1007/978-1-4419-7133-3\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BishopEFGGPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BowenSKS10, author = {Brian M. Bowen and Malek Ben Salem and Angelos D. Keromytis and Salvatore J. Stolfo}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Monitoring Technologies for Mitigating Insider Threats}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {197--217}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_9}, doi = {10.1007/978-1-4419-7133-3\_9}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BowenSKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Coles-KempT10, author = {Lizzie Coles{-}Kemp and Marianthi Theoharidou}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Insider Threat and Information Security Management}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {45--71}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_3}, doi = {10.1007/978-1-4419-7133-3\_3}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Coles-KempT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/CramptonH10, author = {Jason Crampton and Michael Huth}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Towards an Access-Control Framework for Countering Insider Threats}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {173--195}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_8}, doi = {10.1007/978-1-4419-7133-3\_8}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/CramptonH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/FlegelKMMWL10, author = {Ulrich Flegel and Florian Kerschbaum and Philip Miseldine and Ganna Monakova and Richard Wacker and Frank Leymann}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {139--171}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_7}, doi = {10.1007/978-1-4419-7133-3\_7}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/FlegelKMMWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/FlegelVB10, author = {Ulrich Flegel and Julien Vayssi{\`{e}}re and Gunter Bitz}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {A State of the Art Survey of Fraud Detection Technology}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {73--84}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_4}, doi = {10.1007/978-1-4419-7133-3\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/FlegelVB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/GreitzerF10, author = {Frank L. Greitzer and Deborah A. Frincke}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {85--113}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_5}, doi = {10.1007/978-1-4419-7133-3\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/GreitzerF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/MagklarasF10, author = {George Magklaras and Steven Furnell}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Insider Threat Specification as a Threat Mitigation Technique}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {219--244}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_10}, doi = {10.1007/978-1-4419-7133-3\_10}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/MagklarasF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Neumann10, author = {Peter G. Neumann}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Combatting Insider Threats}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {17--44}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_2}, doi = {10.1007/978-1-4419-7133-3\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Neumann10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ProbstHGB10, author = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Aspects of Insider Threats}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {1--15}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_1}, doi = {10.1007/978-1-4419-7133-3\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/ProbstHGB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/49, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3}, doi = {10.1007/978-1-4419-7133-3}, isbn = {978-1-4419-7132-6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/49.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.