Volume 2, Number 1 (March 2011) BibTex 
Addressing Insider Threats and Information Leakage

  • pp. 1-3
    Guest Editorial: Addressing Insider Threats and Information Leakage

    Christian W. Probst, Ilsun You, Dongwan Shin and Kouichi Sakurai
    [pdf]
  • pp. 4-27
    Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques
    Jeffrey Hunker and Christian W. Probst 
    [Abstract][pdf]
  • pp. 28-49
    A Preliminary Model of Insider Theft of Intellectual Property
    Andrew P. Moore, Dawn M. Cappelli, Thomas C. Caron, Eric Shaw, Derrick Spooner and Randall F. Trzeciak
    [Abstract][pdf
  • pp. 50-62
    Model for a Common Notion of Privacy Leakage on Public Database
    Shinsaku Kiyomoto and Keith M. Martin
    [Abstract][pdf]
  • pp. 63-74
    Collaborative Intrusion Detection Networks and Insider Attacks
    Carol Fung
    [Abstract][pdf]
  • pp. 75-92
    Representing Humans in System Security Models: An Actor-Network Approach
    Wolter Pieters
    [Abstract][pdf]
  • pp. 93-102
    Improved Estimation of Trilateration Distances for Indoor Wireless Intrusion Detection
    Philip Nobles, Shahid Ali and Howard Chivers 
    [Abstract][pdf]
  • pp. 103-120
    Detecting Anomalies in Active Insider Stepping Stone Attacks
    Giovanni Di Crescenzo, Abhrajit Ghosh,  Abhinay Kampasi, Rajesh Talpade and Yin Zhang
    [Abstract][pdf]


    [Return to Archives]