DocumentCode
2336865
Title
Performance analysis of an insider threat mitigation model
Author
Althebyan, Qutaibah ; Panda, Brajendra
Author_Institution
Univ. of Arkansas, Fayetteville, AR
fYear
2008
fDate
13-16 Nov. 2008
Firstpage
703
Lastpage
709
Abstract
In this work, we presented an approach to extract knowledge out of an object. A graph theory approach to represent and manage the knowledge is explained. We then presented a performance analysis for an insider threat mitigation model proposed earlier. We relied on some characteristics of the insiders and the decomposition of objects in the underlying system in developing our method and conducting our simulation. Our modelpsilas results showed great resistance against such attacks.
Keywords
graph theory; knowledge acquisition; security of data; graph theory; insider threat mitigation model; knowledge extraction; performance analysis; Computational modeling; Computer crime; Graph theory; Humans; Information systems; Information technology; Knowledge management; Performance analysis; Performance evaluation; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Digital Information Management, 2008. ICDIM 2008. Third International Conference on
Conference_Location
London
Print_ISBN
978-1-4244-2916-5
Electronic_ISBN
978-1-4244-2917-2
Type
conf
DOI
10.1109/ICDIM.2008.4746709
Filename
4746709
Link To Document