Empirical Detection Techniques of Insider Threat Incidents (original) (raw)
Related papers
ACM Computing Surveys (CSUR), 2018
Caught in the act of an insider attack: detection and assessment of insider threat
2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015
Detecting Unknown Insider Threat Scenarios
International Journal on Computational Science & Applications, 2016
A methodology and supporting techniques for the quantitative assessment of insider threats
Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing - DISCCO '13, 2013
AZALIA: an A to Z assessment of the likelihood of insider attack
2009
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications, 2013
Insider Threat Assessment: a Model-Based Methodology
ACM Computing Surveys, 2019
Validating an Insider Threat Detection System: A Real Scenario Perspective
2016 IEEE Security and Privacy Workshops (SPW), 2016
A review on Insider Threats Detection and Prevention Techniques: Analysis, Taxonomy and Challenges
A Multi-Tiered Framework for Insider Threat Prevention
Electronics
Multidimensional Insider Threat Detection Model for Organization
2021
An Insider Threat Prediction Model
Alexios Mylonas, DIMITRIS GRITZALIS
Lecture Notes in Computer Science, 2010
Techniques and countermeasures for preventing insider threats
PeerJ Computer Science, 2022
Insider Threat Detection and Mitigation Techniques
Scientific Bulletin of Naval Academy, 2017
Opportunistic machine learning methods for effective insider threat detection
2018
Insider Threat Event Detection in User-System Interactions
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, 2017
DTB Project: A Behavioral Model for Detecting Insider Threats
2005
The Application of Artificial Intelligence in the Detection of Malicious Insider Threats: A Review
Corpus Intellectual, 2024
Understanding Insider Threat: A Framework for Characterising Attacks
2014 IEEE Security and Privacy Workshops, 2014
Identifying attack patterns for insider threat detection
Computer Fraud & Security, 2015
Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
Electronics
Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data
IEEE Transactions on Computational Social Systems, 2014
A State Machine System for Insider Threat Detection
Graphical Models for Security, 2019
A review for insider threats detection using machine learning
INNOVATIONS IN COMPUTATIONAL AND COMPUTER TECHNIQUES: ICACCT-2021
Stopping Insiders before They Attack: Understanding Motivations and Drivers
2016
Proactive Detection of Insider Attacks
2007
A Big Data Approach Towards Detection of Insider Attack
Journal of Network and Information Security, 2018
A Risk Management Approach to the “Insider Threat
2010
Review on Insider Threat Detection Techniques
Journal of Physics: Conference Series, 2019
Insider threat: a potential challenges for the information security domain