Analysis of Insiders Attack Mitigation Strategies
Open Access
- 1 May 2014
- journal article
- Published by Elsevier BV in Procedia - Social and Behavioral Sciences
- Vol. 129, 611-618
- https://doi.org/10.1016/j.sbspro.2014.06.002
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Security and Privacy-Enhancing Multicloud ArchitecturesIEEE Transactions on Dependable and Secure Computing, 2013
- Insider Threats to Cloud Computing: Directions for New Research ChallengesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Security Challenges for the Public CloudIEEE Internet Computing, 2012
- On Cloud Computing Security IssuesLecture Notes in Computer Science, 2012
- Insider Threat Detection Using Stream Mining and Graph MiningPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Detection of anomalous insiders in collaborative environments via relational analysis of access logsPublished by Association for Computing Machinery (ACM) ,2011
- Preventing Insider Attacks in the CloudCommunications in Computer and Information Science, 2011
- Malicious Modification Attacks by Insiders in Relational Databases: Prediction and PreventionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Security Issues to Cloud ComputingPublished by Springer Science and Business Media LLC ,2010
- Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utilityFuture Generation Computer Systems, 2009