Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes. Sarkar, A., Köhler, S., Ludäscher, B., & Bishop, M. IEEE Syst. J., 11(2):522–533, 2017. Paper doi bibtex @article{sarkar_insider_2017,
title = {Insider {Attack} {Identification} and {Prevention} in {Collection}-{Oriented} {Dataflow}-{Based} {Processes}},
volume = {11},
url = {https://doi.org/10.1109/JSYST.2015.2477472},
doi = {10.1109/JSYST.2015.2477472},
number = {2},
journal = {IEEE Syst. J.},
author = {Sarkar, Anandarup and Köhler, Sven and Ludäscher, Bertram and Bishop, Matt},
year = {2017},
pages = {522--533},
}
Downloads: 0
{"_id":"pTc2YQinoF7HkXtdQ","bibbaseid":"sarkar-khler-ludscher-bishop-insiderattackidentificationandpreventionincollectionorienteddataflowbasedprocesses-2017","downloads":0,"creationDate":"2018-10-17T17:51:35.016Z","title":"Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes","author_short":["Sarkar, A.","Köhler, S.","Ludäscher, B.","Bishop, M."],"year":2017,"bibtype":"article","biburl":"https://raw.githubusercontent.com/idaks/idaks.github.io/main/iDAKS-publications.bib","bibdata":{"bibtype":"article","type":"article","title":"Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes","volume":"11","url":"https://doi.org/10.1109/JSYST.2015.2477472","doi":"10.1109/JSYST.2015.2477472","number":"2","journal":"IEEE Syst. J.","author":[{"propositions":[],"lastnames":["Sarkar"],"firstnames":["Anandarup"],"suffixes":[]},{"propositions":[],"lastnames":["Köhler"],"firstnames":["Sven"],"suffixes":[]},{"propositions":[],"lastnames":["Ludäscher"],"firstnames":["Bertram"],"suffixes":[]},{"propositions":[],"lastnames":["Bishop"],"firstnames":["Matt"],"suffixes":[]}],"year":"2017","pages":"522–533","bibtex":"@article{sarkar_insider_2017,\n\ttitle = {Insider {Attack} {Identification} and {Prevention} in {Collection}-{Oriented} {Dataflow}-{Based} {Processes}},\n\tvolume = {11},\n\turl = {https://doi.org/10.1109/JSYST.2015.2477472},\n\tdoi = {10.1109/JSYST.2015.2477472},\n\tnumber = {2},\n\tjournal = {IEEE Syst. J.},\n\tauthor = {Sarkar, Anandarup and Köhler, Sven and Ludäscher, Bertram and Bishop, Matt},\n\tyear = {2017},\n\tpages = {522--533},\n}\n\n","author_short":["Sarkar, A.","Köhler, S.","Ludäscher, B.","Bishop, M."],"key":"sarkar_insider_2017","id":"sarkar_insider_2017","bibbaseid":"sarkar-khler-ludscher-bishop-insiderattackidentificationandpreventionincollectionorienteddataflowbasedprocesses-2017","role":"author","urls":{"Paper":"https://doi.org/10.1109/JSYST.2015.2477472"},"metadata":{"authorlinks":{}}},"search_terms":["insider","attack","identification","prevention","collection","oriented","dataflow","based","processes","sarkar","köhler","ludäscher","bishop"],"keywords":[],"authorIDs":["54598392b43425b772000646"],"dataSources":["bYCJfwRyen29qPqpz","s4LHTYhEoDoFspE3K"]}