Search

Your search keyword '"Insider threat"' showing total 257 results

Search Constraints

Start Over You searched for: Descriptor "Insider threat" Remove constraint Descriptor: "Insider threat" Topic 02 engineering and technology Remove constraint Topic: 02 engineering and technology
257 results on '"Insider threat"'

Search Results

1. Textual analysis of traitor-based dataset through semi supervised machine learning

2. Ethical leadership and employee information security policy (ISP) violation: exploring dual-mediation paths

3. Experimental Investigation of Technical and Human Factors Related to Phishing Susceptibility

4. Anomaly Detection for Insider Threats Using Unsupervised Ensembles

5. Formal approach to thwart against insider attacks: A bio-inspired auto-resilient policy regulation framework

6. Organizational science and cybersecurity: abundant opportunities for research at the interface

7. Real-Time Abnormal Insider Event Detection on Enterprise Resource Planning Systems via Predictive Auto-Regression Model

8. Insider Threat Modeling: An Adversarial Risk Analysis Approach

9. A Structured Control Selection Methodology for Insider Threat Mitigation

10. An Analysis of Complexity of Insider Attacks to Databases

11. Malicious changeload for the resilience evaluation of self-adaptive authorisation infrastructures

12. Redefining insider threats: a distinction between insider hazards and insider threats

13. 'Real' Insider Threat: Toxic Workplace Behavior in the Intelligence Community

14. Operationalising a framework for organisational vulnerability to intentional insider threat: the OVIT as a valid and reliable diagnostic tool

15. An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection

16. Discovering 'Insider IT Sabotage' based on human behaviour

17. Are your IT staff ready for the pandemic-driven insider threat?

18. Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning

19. A Review of Probabilistic Opinion Pooling Algorithms with Application to Insider Threat Detection

20. Empirical Detection Techniques of Insider Threat Incidents

21. A Review of Insider Threat Detection Approaches With IoT Perspective

22. Mitigating Insider Threat By Profiling Users Based On Mouse Usage Pattern: Ensemble Learning And Frequency Domain Analysis

23. Data-driven Model-based Detection of Malicious Insiders via Physical Access Logs

24. NATO Human View Executable Architectures for Critical Infrastructure Analysis

25. Human factors in information leakage: mitigation strategies for information sharing integrity

26. Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective

27. Design and Implementation of a Comprehensive Insider Threat Ontology

28. Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs

29. G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework

30. DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network

31. A Multi-Tiered Framework for Insider Threat Prevention

32. An Integrated Imbalanced Learning and Deep Neural Network Model for Insider Threat Detection

33. Motivational Quotes-Based Intelligent Insider Threat Prediction Model

34. Integrating Security Behavior into Attack Simulations

35. Towards Process Mining Utilization in Insider Threat Detection from Audit Logs

36. Temporal Behavior in Network Traffic as a Basis for Insider Threat Detection

37. A Parallel and Scalable Framework for Insider Threat Detection

38. DANTE: Predicting Insider Threat using LSTM on system logs

39. The Insider Threat: Reasons, Effects and Mitigation Techniques

40. An Investigation of Insider Threat Mitigation Based on EEG Signal Classification

41. Data Augmentation for Insider Threat Detection with GAN

42. rProfiler -- Assessing Insider Influence on Enterprise Assets

43. Towards an Explainable Approach for Insider Threat Detection: Constraint Network Learning

44. Few-shot Insider Threat Detection

45. Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

46. False data injection attacks and the insider threat in smart systems

47. Impact and key challenges of insider threats on organizations and critical businesses

48. Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats

49. The Visual Analytics Approach for Analyzing Trajectories of Critical Infrastructure Employers

50. Research on Behavior-Based Data Leakage Incidents for the Sustainable Growth of an Organization

Catalog

Books, media, physical & digital resources