Empirical Detection Techniques of Insider Threat Incidents (original) (raw)

Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures

Ivan Homoliak

ACM Computing Surveys (CSUR), 2018

View PDFchevron_right

Caught in the act of an insider attack: detection and assessment of insider threat

Sadie Creese

2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015

View PDFchevron_right

Detecting Unknown Insider Threat Scenarios

MANVENDRA LODHI

International Journal on Computational Science & Applications, 2016

View PDFchevron_right

A methodology and supporting techniques for the quantitative assessment of insider threats

andrea bondavalli

Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing - DISCCO '13, 2013

View PDFchevron_right

AZALIA: an A to Z assessment of the likelihood of insider attack

Frank Greitzer

2009

View PDFchevron_right

Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection

Sadie Creese

Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications, 2013

View PDFchevron_right

Insider Threat Assessment: a Model-Based Methodology

Andrea Bondavalli

View PDFchevron_right

Insight into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures

Ivan Homoliak

ACM Computing Surveys, 2019

View PDFchevron_right

Validating an Insider Threat Detection System: A Real Scenario Perspective

Sadie Creese

2016 IEEE Security and Privacy Workshops (SPW), 2016

View PDFchevron_right

A review on Insider Threats Detection and Prevention Techniques: Analysis, Taxonomy and Challenges

Md. Anisur Rahman Likhon

View PDFchevron_right

A Multi-Tiered Framework for Insider Threat Prevention

Taher Al-Shehari

Electronics

View PDFchevron_right

Multidimensional Insider Threat Detection Model for Organization

ganthan narayana samy

2021

View PDFchevron_right

An Insider Threat Prediction Model

Alexios Mylonas, DIMITRIS GRITZALIS

Lecture Notes in Computer Science, 2010

View PDFchevron_right

Techniques and countermeasures for preventing insider threats

Taher Al-Shehari

PeerJ Computer Science, 2022

View PDFchevron_right

Insider Threat Detection and Mitigation Techniques

Vlad Mihai Cotenescu

Scientific Bulletin of Naval Academy, 2017

View PDFchevron_right

Opportunistic machine learning methods for effective insider threat detection

Diana Haidar

2018

View PDFchevron_right

Insider Threat Event Detection in User-System Interactions

Jean Camp

Proceedings of the 2017 International Workshop on Managing Insider Security Threats, 2017

View PDFchevron_right

DTB Project: A Behavioral Model for Detecting Insider Threats

Kathryn Laskey

2005

View PDFchevron_right

The Application of Artificial Intelligence in the Detection of Malicious Insider Threats: A Review

corpus intellectual

Corpus Intellectual, 2024

View PDFchevron_right

Understanding Insider Threat: A Framework for Characterising Attacks

Monica Whitty

2014 IEEE Security and Privacy Workshops, 2014

View PDFchevron_right

Identifying attack patterns for insider threat detection

Michael Goldsmith

Computer Fraud & Security, 2015

View PDFchevron_right

Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses

Emma Hayes

Electronics

View PDFchevron_right

Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data

Ariella Richardson

IEEE Transactions on Computational Social Systems, 2014

View PDFchevron_right

A State Machine System for Insider Threat Detection

Sadie Creese

Graphical Models for Security, 2019

View PDFchevron_right

A review for insider threats detection using machine learning

Urvashi Garg

INNOVATIONS IN COMPUTATIONAL AND COMPUTER TECHNIQUES: ICACCT-2021

View PDFchevron_right

Stopping Insiders before They Attack: Understanding Motivations and Drivers

Stan Zavoyskiy

2016

View PDFchevron_right

Proactive Detection of Insider Attacks

Dan Roth

2007

View PDFchevron_right

A Big Data Approach Towards Detection of Insider Attack

Publishing India Group

Journal of Network and Information Security, 2018

View PDFchevron_right

A Risk Management Approach to the “Insider Threat

Frank Greitzer

2010

View PDFchevron_right

Review on Insider Threat Detection Techniques

Sunday Adewumi

Journal of Physics: Conference Series, 2019

View PDFchevron_right

Insider threat: a potential challenges for the information security domain

santosh kumar smmarwar

View PDFchevron_right