Search

Your search keyword '"Insider threat"' showing total 1,503 results

Search Constraints

Start Over You searched for: Descriptor "Insider threat" Remove constraint Descriptor: "Insider threat"
1,503 results on '"Insider threat"'

Search Results

4. Insider Threat

5. Enabling Privacy in IT Service Operations

6. From Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric Data

7. Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector.

8. Law-Abiding Criminals: How a Group of Military Over-Interested Persons Became a Threat Against National Security.

9. "The pull to do nothing would be strong": limitations & opportunities in reporting insider threats.

10. Sentiment classification for insider threat identification using metaheuristic optimized machine learning classifiers

11. Detect Insider Threat with Associated Session Graph.

12. Insider threat detection using supervised machine learning algorithms: Insider threat detection using supervised machine learning algorithms: P. Manoharan et al.

15. Unveiling Human Factors: Aligning Facets of Cybersecurity Leadership, Insider Threats, and Arsonist Attributes to Reduce Cyber Risk

16. A SYNTHESIS OF RESEARCH ON INSIDER THREATS IN CYBERSECURITY.

17. Employee risk recognition and reporting of malicious elicitations: longitudinal improvement with new skills-based training.

18. Applying a New Approach to Consider the Human Factor in the Design of Information Security Systems.

19. Method for the Detection of Internal Threats in Academic Campus Networks

20. An Empirical Study on Insider Threats Towards Crime Prevention Through Environmental Design (CPTED) : A Student Case Study

22. National Security, Insider Threat Programs, and the Compliance-Industrial Complex: Reflections on Platformization in Corporate Policing, Intelligence, and Security

23. Insider Threat Defense Strategies: Survey and Knowledge Integration

26. A Study on Historical Behaviour Enabled Insider Threat Prediction

30. Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector

32. Time Aspect of Insider Threat Mitigation.

33. Fiends and Fools: A Narrative Review and Neo-socioanalytic Perspective on Personality and Insider Threats.

34. M-EOS: modified-equilibrium optimization-based stacked CNN for insider threat detection.

35. Unveiling Human Factors: Aligning Facets of Cybersecurity Leadership, Insider Threats, and Arsonist Attributes to Reduce Cyber Risk.

36. Employee risk recognition and reporting of malicious elicitations: longitudinal improvement with new skills-based training

37. A Review of the Insider Threat, a Practitioner Perspective Within the U.K. Financial Services

38. FedITD: A Federated Parameter-Efficient Tuning With Pre-Trained Large Language Models and Transfer Learning Framework for Insider Threat Detection

39. Robust Federated Learning for execution time-based device model identification under label-flipping attack.

40. Cloud leakage in higher education in South Africa: A case of University of Technology.

41. Developing Novel Deep Learning Models to Detect Insider Threats and Comparing the Models from Different Perspectives.

42. Insider Threat Detection on an Imbalanced Dataset Using Balancing Methods

43. Analyzing Information Security Among Nonmalicious Employees

44. To Catch a Thief: Examining Socio-technical Variables and Developing a Pathway Framework for IP Theft Insider Attacks

45. Analysis of Malicious Intruder Threats to Data Integrity

46. MUEBA: A Multi-model System for Insider Threat Detection

47. A novel user oriented network forensic analysis tool

48. Understanding insider threats using Natural Language Processing

49. (Mis)Use of personal technology by employees in financial services organisations

50. Enhancing Insider Malware Detection Accuracy with Machine Learning Algorithms †.

Catalog

Books, media, physical & digital resources