2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering 2011
DOI: 10.1109/sadfe.2011.14
|View full text |Cite
|
Sign up to set email alerts
|

Preparing for the Next Wikileaks: Making Forensics Techniques Work

Abstract: The success of Manning in acquiring and releasing US State Department cables provides strong implications for the likelihood of similar insider threat attacks occurring again in the future. Such future attacks will likely employ more sophisticated methodologies. The first goal of this paper is to begin examining what such sophisticated insider threat attacks might include. Traditionally, organizations have avoided employing insider threat detection mechanisms due to the high rate of false positives and false n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 13 publications
(12 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?