{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:41:52Z","timestamp":1759092112214},"publisher-location":"New York, NY","reference-count":15,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387737416"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73742-3_4","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T10:45:53Z","timestamp":1194950753000},"page":"55-73","source":"Crossref","is-referenced-by-count":11,"title":["Insider Threat Analysis Using Information-Centric Modeling"],"prefix":"10.1007","author":[{"given":"D.","family":"Ha","sequence":"first","affiliation":[]},{"given":"S.","family":"Upadhyaya","sequence":"additional","affiliation":[]},{"given":"H.","family":"Ngo","sequence":"additional","affiliation":[]},{"given":"S.","family":"Pramanik","sequence":"additional","affiliation":[]},{"given":"R.","family":"Chinchani","sequence":"additional","affiliation":[]},{"given":"S.","family":"Mathew","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"P. Ammann, D. Wijesekera and S. Kaushik, Scalable, graph-based network vulnerability analysis, Proceedings of the Ninth ACM Conference on Computer and Communications Security, pp. 217\u2013224, 2002.","DOI":"10.1145\/586110.586140"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"R. Ball, G. Fink and C. North, Home-centric visualization of network traffic for security administration, Proceedings of the ACM Workshop on Visualization and Data Mining for Computer Security, pp. 55\u201364, 2004.","DOI":"10.1145\/1029208.1029217"},{"key":"4_CR3","unstructured":"P. Bradford and N. Hu, A layered approach to insider threat detection and proactive forensics, Proceedings of the Twenty-First Annual Computer Security Applications Conference (Technology Blitz), 2005."},{"issue":"3","key":"4_CR4","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s10878-005-1413-8","volume":"9","author":"R. Chinchani","year":"2005","unstructured":"R. Chinchani, D. Ha, A. Iyer, H. Ngo and S. Upadhyaya, On the hardness of approximating the Min-Hack problem, Journal of Combinatorial Optimization, vol. 9(3), pp. 295\u2013311, 2005.","journal-title":"Journal of Combinatorial Optimization"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"R. Chinchani, A. Iyer, H. Ngo and S. Upadhyaya, Towards a theory of insider threat assessment, Proceedings of the International Conference on Dependable Systems and Networks, pp. 108\u2013117, 2005.","DOI":"10.1109\/DSN.2005.94"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"M. Dacier and Y. Deswarte, Privilege graph: An extension to the typed access matrix model, Proceedings of the European Symposium on Research in Computer Security, pp. 319\u2013334, 1994.","DOI":"10.1007\/3-540-58618-0_72"},{"volume-title":"Learning in Graphical Models","year":"1998","key":"4_CR7","unstructured":"M. Jordan (Ed.), Learning in Graphical Models, MIT Press, Cambridge, Massachusetts, 1998."},{"key":"4_CR8","first-page":"186","volume-title":"Information Security and Cryptography (LNCS 3935)","author":"S. Mauw","year":"2005","unstructured":"S. Mauw and M. Oostdijk, Foundations of attack trees, in Information Security and Cryptography (LNCS 3935), D. Won and S. Kim (Eds.), Springer, Berlin-Heidelberg, Germany, pp. 186\u2013198, 2005."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"C. Phillips, The network inhibition problem, Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing, pp. 776\u2013785, 1993.","DOI":"10.1145\/167088.167286"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"C. Phillips and L. Swiler, A graph-based system for network vulnerability analysis, Proceedings of the New Security Paradigms Workshop, pp. 71\u201379, 1998.","DOI":"10.1145\/310889.310919"},{"key":"4_CR11","unstructured":"B. Schneier, Attack trees: Modeling security threats, Dr. Dobb\u2019s Journal, December 1999."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"O. Sheyner, J. Haines, S. Jha, R. Lippmann and J. Wing, Automated generation and analysis of attack graphs, Proceedings of the IEEE Symposium on Security and Privacy, pp. 273\u2013284, 2002.","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1109\/DISCEX.2001.932182","volume":"2","author":"L. Swiler","year":"2001","unstructured":"L. Swiler, C. Phillips, D. Ellis and S. Chakerian, Computer-attack graph generation tool, Proceedings of the DARPA Information Survivability Conference and Exposition, vol. 2, pp. 307\u2013321, 2001.","journal-title":"Proceedings of the DARPA Information Survivability Conference and Exposition"},{"key":"4_CR14","unstructured":"S. Teoh, K. Ma and S. Wu, A visual exploration process for the analysis of Internet routing data, Proceedings of the Fourteenth IEEE Visualization Conference, pp. 523\u2013530, 2003."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"X. Yin, W. Yurcik, M. Treaster, Y. Li and K. Lakkaraju, Visflowconnect: Netflow visualizations of link relationships for security situational awareness, Proceedings of the ACM Workshop on Visualization and Data Mining for Computer Security, pp. 26\u201334, 2004.","DOI":"10.1145\/1029208.1029214"}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Advances in Digital Forensics III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73742-3_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:17:19Z","timestamp":1619669839000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73742-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387737416"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73742-3_4","relation":{},"subject":[]}}