Exploiting Trust: Stealthy Attacks Through Socioware and Insider Threats.
Aditya K. SoodSherali ZeadallyRohit BansalPublished in: IEEE Syst. J. (2017)
Keyphrases
- insider threat
- countermeasures
- insider attacks
- denial of service attacks
- security threats
- malicious attacks
- cyber attacks
- security risks
- security services
- trust model
- computer security
- trust evaluation
- security breaches
- security architecture
- security protocols
- data corruption
- security vulnerabilities
- security issues
- security mechanisms
- critical infrastructure
- security measures
- buffer overflow
- attack scenarios
- injection attacks
- identity theft
- trust management
- sensitive data
- access control