Justin Myers

Learn More
Malicious insiders represent one of the most difficult categories of threats an organization must consider when mitigating operational risk. Insiders by definition possess elevated privileges; have knowledge about control measures; and may be able to bypass security measures designed to prevent, detect, or react to unauthorized access. In this paper, we(More)
Log management and monitoring activities have traditionally proved very useful in detecting system and network faults. Increasingly, log monitoring has also been recognized for its value in detecting and thwarting malicious behavior on systems and the network. Unfortunately, the centralized methodologies for conducting log monitoring are often not well(More)
rd June 4 th. This volume contains 12 papers selected for presentation at the conference. To assure scientific quality, the selection was based on a strict and anonymous reviewing process. publishes this series in order to make available to a broad public recent findings in informatics (i.e. computer science and information systems), to document conferences(More)
  • 1