Insider Attack and Cyber Security 2008
Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair (Eds.): Insider Attack and Cyber Security - Beyond the Hacker. Springer 2008 Advances in Information Security 39 ISBN 978-0-387-77321-6
Steven M. Bellovin: The Insider Attack Problem Nature and Scope. 1-4
Charles P. Pfleeger: Reflections on the Insider Threat. 5-16
Andrew P. Moore, Dawn M. Cappelli, Randall F. Trzeciak: The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures. 17-52
Michael McCormick: Data Theft: A Prototypical Insider Threat. 53-68
Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo: A Survey of Insider Attack Detection Research. 69-90
Kevin S. Killourhy, Roy A. Maxion: Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure. 91-112
Ravi Sahita, Uday Savagaonkar: Towards a Virtualization-enabled Framework for Information Traceability (VFIT). 113-132
Ravishankar K. Iyer, Paul Dabrowski, Nithin Nakka, Zbigniew Kalbarczyk: Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach. 133-152
Virgil D. Gligor, C. Sekar Chandersekaran: Surviving Insider Attacks: A Call for System Experiments. 153-164
Sara Sinclair, Sean W. Smith: Preventative Directions For Insider Threat Mitigation Via Access Control. 165-194
Jeffrey Hunker: Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat. 195-214
Angelos D. Keromytis: Hard Problems and Research Challenges. 215-218
Angelos D. Keromytis: Hard Problems and Research Challenges Concluding Remarks. 219-222



