Search dblp for Publications

export results for "toc:db/series/ais/ais49.bht:"

 download as .bib file

@incollection{DBLP:series/ais/BishopEFGGPW10,
  author       = {Matt Bishop and
                  Sophie Engle and
                  Deborah A. Frincke and
                  Carrie Gates and
                  Frank L. Greitzer and
                  Sean Peisert and
                  Sean Whalen},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {A Risk Management Approach to the "Insider Threat"},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {115--137},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_6},
  doi          = {10.1007/978-1-4419-7133-3\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BishopEFGGPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BowenSKS10,
  author       = {Brian M. Bowen and
                  Malek Ben Salem and
                  Angelos D. Keromytis and
                  Salvatore J. Stolfo},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Monitoring Technologies for Mitigating Insider Threats},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {197--217},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_9},
  doi          = {10.1007/978-1-4419-7133-3\_9},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BowenSKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Coles-KempT10,
  author       = {Lizzie Coles{-}Kemp and
                  Marianthi Theoharidou},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Insider Threat and Information Security Management},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {45--71},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_3},
  doi          = {10.1007/978-1-4419-7133-3\_3},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Coles-KempT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/CramptonH10,
  author       = {Jason Crampton and
                  Michael Huth},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Towards an Access-Control Framework for Countering Insider Threats},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {173--195},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_8},
  doi          = {10.1007/978-1-4419-7133-3\_8},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/CramptonH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FlegelKMMWL10,
  author       = {Ulrich Flegel and
                  Florian Kerschbaum and
                  Philip Miseldine and
                  Ganna Monakova and
                  Richard Wacker and
                  Frank Leymann},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Legally Sustainable Solutions for Privacy Issues in Collaborative
                  Fraud Detection},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {139--171},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_7},
  doi          = {10.1007/978-1-4419-7133-3\_7},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FlegelKMMWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FlegelVB10,
  author       = {Ulrich Flegel and
                  Julien Vayssi{\`{e}}re and
                  Gunter Bitz},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {A State of the Art Survey of Fraud Detection Technology},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {73--84},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_4},
  doi          = {10.1007/978-1-4419-7133-3\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FlegelVB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/GreitzerF10,
  author       = {Frank L. Greitzer and
                  Deborah A. Frincke},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Combining Traditional Cyber Security Audit Data with Psychosocial
                  Data: Towards Predictive Modeling for Insider Threat Mitigation},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {85--113},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_5},
  doi          = {10.1007/978-1-4419-7133-3\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/GreitzerF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/MagklarasF10,
  author       = {George Magklaras and
                  Steven Furnell},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Insider Threat Specification as a Threat Mitigation Technique},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {219--244},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_10},
  doi          = {10.1007/978-1-4419-7133-3\_10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/MagklarasF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Neumann10,
  author       = {Peter G. Neumann},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Combatting Insider Threats},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {17--44},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_2},
  doi          = {10.1007/978-1-4419-7133-3\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Neumann10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ProbstHGB10,
  author       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Aspects of Insider Threats},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_1},
  doi          = {10.1007/978-1-4419-7133-3\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/ProbstHGB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/49,
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3},
  doi          = {10.1007/978-1-4419-7133-3},
  isbn         = {978-1-4419-7132-6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/49.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics