Sciweavers

1411 search results - page 1 / 283
» Case Studies of an Insider Framework
Sort
View
HICSS
2009
IEEE
124views Biometrics» more  HICSS 2009»
13 years 11 months ago
Case Studies of an Insider Framework
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...
ADHOC
2005
134views more  ADHOC 2005»
13 years 4 months ago
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It ...
Peng Ning, Kun Sun
HICSS
2007
IEEE
149views Biometrics» more  HICSS 2007»
13 years 11 months ago
Managing a New Computer Device Development in a Creative ISO 9001 Certified Company: A Case Study
This paper describes the findings of a case study that explores the micro level factors surrounding the processes of creativity and process management in a creative organization. ...
Wolfgang Molnar, Joe Nandhakumar
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 4 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
15
Voted
IJNSEC
2010
145views more  IJNSEC 2010»
12 years 11 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh