In the Name of Security – Secrecy, Surveillance and Journalism
DOI: 10.2307/j.ctt22rbjhf.6
|View full text |Cite
|
Sign up to set email alerts
|

Undesirable Types – The Surveillance of Journalists

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…NIDS has caught the scientific community's attention as a vital tool for guaranteeing network security since its inception by Anderson [15] in 1980. As a classification problem, NIDS can be categorized into three (3) different methodological concepts (i.e., Anomaly, Misuse, and hybridized detection).…”
Section: Related Workmentioning
confidence: 99%
“…NIDS has caught the scientific community's attention as a vital tool for guaranteeing network security since its inception by Anderson [15] in 1980. As a classification problem, NIDS can be categorized into three (3) different methodological concepts (i.e., Anomaly, Misuse, and hybridized detection).…”
Section: Related Workmentioning
confidence: 99%
“…For example, Eugene [62] claimed that profiling user behaviour for intrusion detection originated from Anderson [35], who introduces the idea of using an automated surveillance system that looks for profiles such as session logs, durations, program usage, device usage, and file usage. Anderson categorises users into three different user groups, namely: legitimate, masquerade, and clandestine.…”
Section: System Profilesmentioning
confidence: 99%
“…Due to this merit, there have been more attempts recently on this area such as analysis of the difference, in terms of speed or accuracy, between using a singular profile and combining multiple profiles. For example, Anderson [35] combines session logs, device usage, file usage durations and program usage to indirectly profile user behaviours; Denning [18] detects anomalies by extracting user logins, CPU usage and I/O usage. Others combine different user behaviours directly for anomaly detections.…”
Section: Combining Profiles In Idsmentioning
confidence: 99%
See 2 more Smart Citations