A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications.
Shuyuan Mary HoHwajung LeePublished in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2012)
Keyphrases
- finite state machines
- insider threat
- finite state automata
- cloud computing
- model checking
- security architecture
- data leakage prevention
- hidden markov models
- communication systems
- data streams
- critical infrastructure
- anomaly detection
- database
- regular expressions
- cyber security
- communication networks
- access control