Identifying at-risk employees: A behavioral model for predicting potential insider threats (original) (raw)

Monitoring Technologies for Mitigating Insider Threats

Malek Ben Salem

Advances in Information Security, 2010

View PDFchevron_right

DTB Project: A Behavioral Model for Detecting Insider Threats

Kathryn Laskey

2005

View PDFchevron_right

Using dynamic models to support inferences of insider threat risk

Paul Sticha

Computational and Mathematical Organization Theory, 2016

View PDFchevron_right

A methodology and supporting techniques for the quantitative assessment of insider threats

andrea bondavalli

Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing - DISCCO '13, 2013

View PDFchevron_right

Caught in the act of an insider attack: detection and assessment of insider threat

Sadie Creese

2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015

View PDFchevron_right

Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures

Ivan Homoliak

ACM Computing Surveys (CSUR), 2018

View PDFchevron_right

Common Sense Guide to Prevention and Detection of Insider Threats

Taangatoa Taanga

View PDFchevron_right

An Insider Threat Prediction Model

Alexios Mylonas, DIMITRIS GRITZALIS

Lecture Notes in Computer Science, 2010

View PDFchevron_right

A Multi-Tiered Framework for Insider Threat Prevention

Taher Al-Shehari

Electronics

View PDFchevron_right

Insider Threat Assessment: a Model-Based Methodology

Andrea Bondavalli

View PDFchevron_right

Empirical Detection Techniques of Insider Threat Incidents

Taher Al-Shehari

IEEE Access, 2020

View PDFchevron_right

Understanding Insider Threat: A Framework for Characterising Attacks

Monica Whitty

2014 IEEE Security and Privacy Workshops, 2014

View PDFchevron_right

An Integrated System for Insider Threat Detection

Phillip Bradford

IFIP — The International Federation for Information Processing, 2007

View PDFchevron_right

Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation

Frank Greitzer

Advances in Information Security, 2010

View PDFchevron_right

Use of Expert Judgments to Inform Bayesian Models of Insider Threat Risk

Paul Sticha

J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

View PDFchevron_right

Detecting Unknown Insider Threat Scenarios

MANVENDRA LODHI

International Journal on Computational Science & Applications, 2016

View PDFchevron_right

Behavioral Science Guidelines for Assessing Insider Threats

Mario Scalora

2008

View PDFchevron_right

A Bayesian Network Model for Predicting Insider Threats

Paul Sticha

2013 IEEE Security and Privacy Workshops, 2013

View PDFchevron_right

Modeling Insider Threat from the Inside and Outside: Individual and Environmental Factors Examined Using Event History Analysis

Ray Zimmerman

2018

View PDFchevron_right

Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection

Sadie Creese

Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications, 2013

View PDFchevron_right

Insider threat: a potential challenges for the information security domain

santosh kumar smmarwar

View PDFchevron_right

A human factors contribution to countering insider threats: Practical prospects from a novel approach to warning and avoiding

Anjali Anjali

Security Journal, 2017

View PDFchevron_right

Sorting Insiders From Co-Workers: Remote Synchronous Computer-Mediated Triage for Investigating Insider Attacks

Linden J Ball

Human Factors, 2022

View PDFchevron_right

A review on Insider Threats Detection and Prevention Techniques: Analysis, Taxonomy and Challenges

Md. Anisur Rahman Likhon

View PDFchevron_right

Insider Threats

Georgios Theodoropoulos

2015

View PDFchevron_right

Insight into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures

Ivan Homoliak

ACM Computing Surveys, 2019

View PDFchevron_right

Automated Insider Threat Detection System Using User and Role-Based Profile Assessment

Sadie Creese

IEEE Systems Journal, 2015

View PDFchevron_right