References
- B. J. Lee, H. S. Jeon, H. Y. Song, "Information-Centric Networking Research Trend", Electronics and Telecommunications Trends, 2012.
- S. J. Oh, "An Anomaly Detection Method for the Security of VANETs", The Journal of The Institute of Internet, Broadcasting and Communication, vol. 14, no. 6, pp. 175-185, 2014. https://doi.org/10.7236/JIIBC.2014.14.6.175
- S. J. Oh, "Design and Evaluation of a Weighted Intrusion Detection Method for VANETs", The Journal of The Institute of Webcasting, Internet and Telecommunication, vol. 11, no. 3, pp. 181-188, 2011.
- S. Kim, S.-J. Oh, "A Big Data Application for Anomaly Detection in VANETs", The Journal of The Institute of Internet, Broadcasting and Communication (IIBC), vol. 14, no. 6, pp. 175-181, Dec. 2014. DOI: http://dx.doi.org/10.7236/JIIBC.2014.14.6.175
- V. J. Hodge, J. Austin, "A Survey of Outlier Detection Methologies", Artificial Intelligence Review, vol. 22, no. 2, pp. 85-126, 2004. DOI: http://dx.doi.org/10.1023/B:AIRE.0000045502.10941.a9
- W.-S. Kim, S. Kim, "A Study on Information Effluence State and Measure by Peer-to-Peer Programs in Korea and Japan", The Journal of The Institute of Webcasting, Internet Television and Telecommunication, vol. 9 no. 1, pp. 67-74, 2009.
- V. Chandola, A. Banerjee, Vipin Kumar, "Anomaly detection : A survey", ACM Computing Surveys(CSUR), vol. 41 no. 3, 2009. DOI: http://dx.doi.org/10.1145/1541880.1541882
- F. Sabahi, A. Movaghar, "Intrusion Detection : A Survey", The Third International Conference on Systems and Networks Communications, pp. 23-26, 2008. DOI: http://dx.doi.org/10.1109/icsnc.2008.44
- Monowar H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, "Network Anomaly Detection : Methods, Systems and Tools", IEEE Communications Surveys & Tutorials, vol. 16, no. 1, 2014. DOI: http://dx.doi.org/10.1109/SURV.2013.052213.00046
- M. R. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore, "Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector", CERT and the National Threat Assessment Center, Aug. 2004.
- E. D. Shaw, K. G. Ruby, and J. M. Post, "The insider threat to information systems: The psychology of the dangerous insider", Security Awareness Bulletin, vol. 2-98, pp. 27-46, Sept. 1998.
- L. Spitzner, "Honeypots: catching the insider threat", Proceedings of 19th Annual Computer Security Applications Conference, pp. 170-179, Dec. 2003. DOI: http://dx.doi.org/10.1109/csac.2003.1254322
- M. B. Salem, S. Hershkop, S. J. Stoplfo, "A Survey of Insider Attack Detection Research", Insider Attack and Cyber Security, vol. 39, pp. 69-90, 2008. DOI: http://dx.doi.org/10.1007/978-0-387-77322-3_5
- S. Y. Lim, A. Jones, "Network Anomaly Detection System : The State of art of Network Behaviour Analysis", International Conference on Convergence and Hybrid Information Technology, 2008. DOI: http://dx.doi.org/10.1109/ichit.2008.249
- V. Chandola, A. Banerjee, V. Kumar, "Anomaly Detection for Discrete Sequences: A Survey", IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 5, May 2012. DOI: http://dx.doi.org/10.1109/TKDE.2010.235
- G. B. Magklaras, "Insider Threat Prediction Tool: Evaluating the probability of IT misuse", Elsevier Science C&C, 2002.
- Y. Liu, "SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack ", IEEE HICSS, 2009. DOI: http://dx.doi.org/10.1109/HICSS.2009.390
- A. Al-Bataineh, "Analysis and Detection of Malicious Data Exfiltration in Web Traffic", IEEE Malicious and Unwanted Software, 2012. DOI: http://dx.doi.org/10.1109/malware.2012.6461004
- R. Ramachandran, "Behavior model for Detecting data Exfiltration in Network Environment", IEEE, 2011. DOI: http://dx.doi.org/10.1109/imsaa.2011.6156340
- P. Parveen, "Insider Threat Detection using Stream Mining and Graph Mining", IEEE ICSC, 2012.