Combating the Insider Cyber Threat.
Frank L. GreitzerAndrew P. MooreDawn M. CappelliDee H. AndrewsLynn A. CarrollThomas D. HullPublished in: IEEE Secur. Priv. (2008)
Keyphrases
- cyber crime
- insider threat
- crime investigation
- law enforcement
- cyber security
- cyber attacks
- cyber defense
- identity theft
- countermeasures
- sir model
- critical infrastructure
- cyber physical
- computer vision
- neural network
- sensitive data
- information management
- web spam
- security architecture
- information sharing
- social network analysis
- information technology
- genetic algorithm