{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:06:13Z","timestamp":1725541573404},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_13","type":"book-chapter","created":{"date-parts":[[2009,11,28]],"date-time":"2009-11-28T03:33:01Z","timestamp":1259379181000},"page":"100-107","source":"Crossref","is-referenced-by-count":4,"title":["The Trend of the Security Research for the Insider Cyber Threat"],"prefix":"10.1007","author":[{"given":"Jaeseung","family":"Hong","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jongwung","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeonghun","family":"Cho","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Richardson, R.: 2003 CSI\/FBI Computer Crime and Security Survey. Computer Security Institute (2003)","DOI":"10.1016\/S1361-3723(03)00208-2"},{"key":"13_CR2","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: 2004 CSI\/FBI Computer Crime and Security Survey. Computer Security Institute (2004)"},{"key":"13_CR3","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: 2005 CSI\/FBI Computer Crime and Security Survey. Computer Security Institute (2005)"},{"key":"13_CR4","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: 2006 CSI\/FBI Computer Crime and Security Survey. Computer Security Institute (2006)"},{"key":"13_CR5","volume-title":"Proceedings of the 2007 IEEE Workshop on Information Assurance","author":"Q. Althebyan","year":"2007","unstructured":"Althebyan, Q., Panda, B.: A Knowledge-Base Model for Insider Threat Prediction. In: Proceedings of the 2007 IEEE Workshop on Information Assurance. United States Military Academy, West Point (2007)"},{"key":"13_CR6","unstructured":"Althebyan, Q., Panda, B.: A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. To Appear in the IFIP 23rd International Information Security Conference, Milan, Italy (September 2008)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Althebyan, Q., Panda, B.: Performance analysis of an insider threat mitigation model. In: ICDIM 2008, pp. 703\u2013709 (2008)","DOI":"10.1109\/ICDIM.2008.4746709"},{"key":"13_CR8","unstructured":"Spitzner, L.: Honeypots: Catching the Insider Threat. In: 19th Annual Computer Security Applications Conference, ACSAC 2003 (2003)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Wang, H., Liu, S., Zhang, i.: A Prediction Model of Insider Threat Based on Multi-agent. In: 2006 1st International Symposium on Pervasive Computing and Applications (2006)","DOI":"10.1109\/SPCA.2006.297582"},{"key":"13_CR10","unstructured":"Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb\u2019s Journal (December 1999)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Santos Jr., E., Nguyen, H., Yu, F., Kim, K., Li, D., Wilkinson, J.T., Olson, A., Jacob, R.: Intent-driven Insider Threat Detection in Intelligence Analyses. In: 2008 IEEE\/WIC\/ACM International Conference on Web Intelligence and Intelligent Agent Technology (2008)","DOI":"10.1109\/WIIAT.2008.376"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Nguyen, H., Santos Jr., E., Zhao, Q., Wang, H.: Capturing User Intent for Information Retrieval. In: Proceedings of the 48th Annual Meeting for the Human Factors and Ergonomics Society (HFES 2004), New Orleans, LA, pp. 371\u2013375 (2004b)","DOI":"10.1177\/154193120404800321"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Santos Jr., E., Nguyen, H., Zhao, Q., Wang, H.: User modelling for intent prediction in information analysis. In: Proceedings of the 47th Annual Meeting for the Human Factors and Ergonomincs Society, pp. 1034\u20131038 (2003a)","DOI":"10.1177\/154193120304700818"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/10720076_50","volume-title":"MICAI 2000: Advances in Artificial Intelligence","author":"M. Montes-y-G\u00f3mez","year":"2000","unstructured":"Montes-y-G\u00f3mez, M., Gelbukh, A., L\u00f3pes-L\u00f3pez, A.: Comparison of Conceptual Graphs. In: Cair\u00f3, O., Cant\u00fa, F.J. (eds.) MICAI 2000. LNCS, vol.\u00a01793. Springer, Heidelberg (2000)"},{"key":"13_CR15","unstructured":"Liu, Y., Corbett, C., Archibald, R., Biswanath: SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack. In: Proceedings of the 42nd Hawaii International Conference on System Sciences (2009)"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T01:38:11Z","timestamp":1558402691000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}