Academic literature on the topic 'Insider attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Insider attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Insider attack"
Nasraddin, Jehan Turki, Eynas Hassan Balkhair, and Dr Manar Salamh. "Detection of Malicious Privileged Access Using a RuleBased Approach." International Journal of Engineering Research and Applications 14, no. 10 (2024): 63–72. http://dx.doi.org/10.9790/9622-14106372.
Full textAl-Shehari, Taher, and Rakan A. Alsowail. "An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques." Entropy 23, no. 10 (2021): 1258. http://dx.doi.org/10.3390/e23101258.
Full textHenge, Santosh Kumar, Aditya Upadhyay, Ashok Kumar Saini, Neha Mishra, Dimpal Sharma, and Gajanand Sharma. "Analysis and detection of insider attacks using behaviour rule based architecture in enterprise multitenancy." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 707–18. http://dx.doi.org/10.47974/jdmsc-1743.
Full textGlancy, Fletcher, David P. Biros, Nan Liang, and Andy Luse. "Classification of malicious insiders and the association of the forms of attacks." Journal of Criminal Psychology 10, no. 3 (2020): 233–47. http://dx.doi.org/10.1108/jcp-03-2020-0012.
Full textPaul, Swagata, Sajal Saha, and Radha Tamal Goswami. "Detection of Unknown Insider Attack on Components of Big Data System: A Smart System Application for Big Data Cluster." International Journal of Computer Network and Information Security 14, no. 5 (2022): 47–59. http://dx.doi.org/10.5815/ijcnis.2022.05.04.
Full textStiawan, Deris, Mohd Yazid Idris, Reza Firsandaya Malik, Siti Nurmaini, Nizar Alsharif, and Rahmat Budiarto. "Investigating Brute Force Attack Patterns in IoT Network." Journal of Electrical and Computer Engineering 2019 (April 1, 2019): 1–13. http://dx.doi.org/10.1155/2019/4568368.
Full textHu, Teng, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, and Xiaosong Zhang. "Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats." Sensors 20, no. 18 (2020): 5297. http://dx.doi.org/10.3390/s20185297.
Full textDusane, Palash Sandip. "Logic Bomb: An Insider Attack." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 3 (2020): 3662–65. http://dx.doi.org/10.30534/ijatcse/2020/176932020.
Full text., Sonika, Sandeep Kumar Arora, and Mahedi Masud. "Review on Security Based Vehicular Ad-Hoc Network." International Journal of Engineering & Technology 7, no. 3.8 (2018): 125. http://dx.doi.org/10.14419/ijet.v7i3.8.16846.
Full textChowdhury, Morshed, Biplob Ray, Sujan Chowdhury, and Sutharshan Rajasegarar. "A Novel Insider Attack and Machine Learning Based Detection for the Internet of Things." ACM Transactions on Internet of Things 2, no. 4 (2021): 1–23. http://dx.doi.org/10.1145/3466721.
Full textDissertations / Theses on the topic "Insider attack"
Nsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Full textDoss, Gary. "An Approach to Effectively Identify Insider Attacks within an Organization." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/138.
Full textUsmani, Wali Ahmed. "Not able to resist the urge : social insider attacks on Facebook." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/60294.
Full textAditham, Santosh. "Mitigation of Insider Attacks for Data Security in Distributed Computing Environments." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6639.
Full textJUNG, SANG SHIN. "Attacking and Securing Beacon-Enabled 802.15.4 Networks." Digital Archive @ GSU, 2011. http://digitalarchive.gsu.edu/cs_theses/74.
Full textKambhampaty, Krishna Kanth. "Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/29914.
Full textRadhouani, Amira. "Méthodes formelles pour l'extraction d'attaques internes des Systèmes d'Information." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM025/document.
Full text"A Model for Calculating Damage Potential in Computer Systems." Master's thesis, 2019. http://hdl.handle.net/2286/R.I.53889.
Full textWong, Angela S. L. "Multimedia transaction tracking from a mutual distrust perspective." 2007. http://hdl.handle.net/2440/49549.
Full textKrauß, Christoph. "Handling Insider Attacks in Wireless Sensor Networks." Phd thesis, 2010. https://tuprints.ulb.tu-darmstadt.de/2158/1/Dissertation_ckrauss.pdf.
Full textBooks on the topic "Insider attack"
Stolfo, Salvatore J., Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, and Sara Sinclair, eds. Insider Attack and Cyber Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-77322-3.
Full textWorkshop on Insider Attack and Cyber Security (1st : 2007 : Washington, D.C.), ed. Insider attack and cyber security: Beyond the hacker. Springer, 2008.
Find full textYang, Qing, and Lin Huang. Inside Radio: An Attack and Defense Guide. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8447-8.
Full textStorad, Conrad J. Inside AIDS: HIV attacks the immune system. Lerner Publications Co., 1998.
Find full textBrancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Auerbach Publications, 2007.
Find full textM, Goldstein Donald, and Dillon Katherine V, eds. The Pearl Harbor papers: Inside the Japanese plans. Brasseyʼs (US), 1993.
Find full textBook chapters on the topic "Insider attack"
Haber, Morey J., and Brad Hibbert. "Insider Threats." In Privileged Attack Vectors. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3048-0_6.
Full textHaber, Morey J. "Insider and External Threats." In Privileged Attack Vectors. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5914-6_7.
Full textChowdhury, Morshed U., Robin Doss, Biplob Ray, Sutharshan Rajasegarar, and Sujan Chowdhury. "IoT Insider Attack - Survey." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49610-4_3.
Full textMcCormick, Michael. "Data Theft: A Prototypical Insider Threat." In Insider Attack and Cyber Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-77322-3_4.
Full textIbrahim, Amjad, Simon Rehwald, Antoine Scemama, Florian Andres, and Alexander Pretschner. "Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks." In Graphical Models for Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62230-5_1.
Full textWu, Tong, Sha Ma, Yi Mu, and Shengke Zeng. "ID-Based Encryption with Equality Test Against Insider Attack." In Information Security and Privacy. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60055-0_9.
Full textRajamanickam, Siranjeevi, N. Ramasubramanian, and Satyanarayana Vollala. "Insider Attack Prevention using Multifactor Authentication Protocols - A Survey." In Advances in Intelligent Systems and Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2008-9_32.
Full textLode, Vijaya, Kekhelo Lasushe, and Anil Pinapati. "Security in VANETs with Insider Attack Resistance and Signature Aggregation." In Advances in Data-Driven Computing and Intelligent Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9521-9_38.
Full textCui, Xiaohui, Wade Gasior, Justin Beaver, and Jim Treadwell. "ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention." In Computational Science and Its Applications – ICCSA 2012. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31128-4_48.
Full textKammüller, Florian, Jason R. C. Nurse, and Christian W. Probst. "Attack Tree Analysis for Insider Threats on the IoT Using Isabelle." In Lecture Notes in Computer Science. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39381-0_21.
Full textConference papers on the topic "Insider attack"
Bardhan, Shuvo. "A Risk Assessment based RBAC using Attack Graphs to Mitigate Insider Threat during UAQ." In 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2024. http://dx.doi.org/10.1109/compsac61105.2024.00190.
Full textAmri, Jamel, Egil Gulbrandsen, and Ricardo P. Nogueira. "Effect of Acetic Acid on Propagation and Stifling of Localized Attacks in CO2 Corrosion of Carbon Steel." In CORROSION 2009. NACE International, 2009. https://doi.org/10.5006/c2009-09284.
Full textTenopir, T. J., and B. B. Bavarian. "Localized Corrosion of Carbon and Low Alloy Steels in the Marine Environment." In CORROSION 1988. NACE International, 1988. https://doi.org/10.5006/c1988-88396.
Full textTossey, Brett M., John Shingledecker, and Barbara (Nikki) Padgett. "Technical Root Cause Analysis of Localized Corrosion in Wet Flue Gas Desulfurization Slurry at Coal-Fired Power Stations." In CORROSION 2014. NACE International, 2014. https://doi.org/10.5006/c2014-4442.
Full textZewdie, Marshet, Anteneh Girma, and Tilahun Melak Sitote. "Deep Neural Networks for Detecting Insider Threats and Social Engineering Attacks." In 2024 International Conference on Electrical, Computer and Energy Technologies (ICECET). IEEE, 2024. http://dx.doi.org/10.1109/icecet61485.2024.10698519.
Full textSivanagireddy, K., S. Jagadeesh, K. Suresh Kumar, B. A. Chandrika, M. Kranthi Kumar, and P. Rajalingam. "Detecting and Mitigating Insider Threat Attacks in Cloud using Machine Learning." In 2024 IEEE 6th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA). IEEE, 2024. https://doi.org/10.1109/icccmla63077.2024.10871803.
Full textSong, Jinwoo, Xinyu He, and Young Moon. "Insider Attack Scenario Assessment Framework." In ASME 2021 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/imece2021-69907.
Full textVarsha Suresh, P., and Minu Lalitha Madhavu. "Insider Attack: Internal Cyber Attack Detection Using Machine Learning." In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2021. http://dx.doi.org/10.1109/icccnt51525.2021.9579549.
Full textZhifeng Luo and Chen Liang. "An insider attack on shilling attack detection for recommendation systems." In 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2016. http://dx.doi.org/10.1109/icsess.2016.7883066.
Full textArmstrong, Colin. "Mapping Social Media Insider Threat Attack Vectors." In 2013 46th Hawaii International Conference on System Sciences (HICSS). IEEE, 2013. http://dx.doi.org/10.1109/hicss.2013.392.
Full textReports on the topic "Insider attack"
Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Full textFloyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, 2022. http://dx.doi.org/10.54206/102376/rsfd6862.
Full textChu, Tsong-Lun, Athi Varuttamaseni, Joo-Seok Baek, and Susan Pepper. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1329799.
Full textKerber, Steve, and Robin Zevotek. Fire Service Summary Report: Study of Residential Attic Fire Mitigation Tactics and Exterior Fire Spread Hazards on Firefighter Safety. UL Firefighter Safety Research Institute, 2014. http://dx.doi.org/10.54206/102376/pxtq2256.
Full textKerber, Steve, and Robin Zevotek. Study of Residential Attic Fire Mitigation Tactics and Exterior Fire Spread Hazards on Firefighter Safety Released. UL Firefighter Safety Research Institute, 2014. http://dx.doi.org/10.54206/102376/lihb1439.
Full textHillestad, Torgeir Martin. The Metapsychology of Evil: Main Theoretical Perspectives Causes, Consequences and Critique. University of Stavanger, 2014. http://dx.doi.org/10.31265/usps.224.
Full text