Journal articles on the topic 'Insider attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Insider attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nasraddin, Jehan Turki, Eynas Hassan Balkhair, and Dr Manar Salamh. "Detection of Malicious Privileged Access Using a RuleBased Approach." International Journal of Engineering Research and Applications 14, no. 10 (2024): 63–72. http://dx.doi.org/10.9790/9622-14106372.
Full textAl-Shehari, Taher, and Rakan A. Alsowail. "An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques." Entropy 23, no. 10 (2021): 1258. http://dx.doi.org/10.3390/e23101258.
Full textHenge, Santosh Kumar, Aditya Upadhyay, Ashok Kumar Saini, Neha Mishra, Dimpal Sharma, and Gajanand Sharma. "Analysis and detection of insider attacks using behaviour rule based architecture in enterprise multitenancy." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 707–18. http://dx.doi.org/10.47974/jdmsc-1743.
Full textGlancy, Fletcher, David P. Biros, Nan Liang, and Andy Luse. "Classification of malicious insiders and the association of the forms of attacks." Journal of Criminal Psychology 10, no. 3 (2020): 233–47. http://dx.doi.org/10.1108/jcp-03-2020-0012.
Full textPaul, Swagata, Sajal Saha, and Radha Tamal Goswami. "Detection of Unknown Insider Attack on Components of Big Data System: A Smart System Application for Big Data Cluster." International Journal of Computer Network and Information Security 14, no. 5 (2022): 47–59. http://dx.doi.org/10.5815/ijcnis.2022.05.04.
Full textStiawan, Deris, Mohd Yazid Idris, Reza Firsandaya Malik, Siti Nurmaini, Nizar Alsharif, and Rahmat Budiarto. "Investigating Brute Force Attack Patterns in IoT Network." Journal of Electrical and Computer Engineering 2019 (April 1, 2019): 1–13. http://dx.doi.org/10.1155/2019/4568368.
Full textHu, Teng, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, and Xiaosong Zhang. "Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats." Sensors 20, no. 18 (2020): 5297. http://dx.doi.org/10.3390/s20185297.
Full textDusane, Palash Sandip. "Logic Bomb: An Insider Attack." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 3 (2020): 3662–65. http://dx.doi.org/10.30534/ijatcse/2020/176932020.
Full text., Sonika, Sandeep Kumar Arora, and Mahedi Masud. "Review on Security Based Vehicular Ad-Hoc Network." International Journal of Engineering & Technology 7, no. 3.8 (2018): 125. http://dx.doi.org/10.14419/ijet.v7i3.8.16846.
Full textChowdhury, Morshed, Biplob Ray, Sujan Chowdhury, and Sutharshan Rajasegarar. "A Novel Insider Attack and Machine Learning Based Detection for the Internet of Things." ACM Transactions on Internet of Things 2, no. 4 (2021): 1–23. http://dx.doi.org/10.1145/3466721.
Full textA G, Rashmi. "Insider Attack Detection in IoT devices using Data Analytics." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 870–74. http://dx.doi.org/10.22214/ijraset.2021.36520.
Full textAnsar, Kainat, Mansoor Ahmed, Saif Ur Rehman Malik, Markus Helfert, and Jungsuk Kim. "Blockchain based general data protection regulation compliant data breach detection system." PeerJ Computer Science 10 (March 15, 2024): e1882. http://dx.doi.org/10.7717/peerj-cs.1882.
Full textLee, SungYup, YoHan Park, and YoungHo Park. "Secure Remote User Authentication Protocol against Privileged-Insider Attack." Journal of Korea Multimedia Society 20, no. 4 (2017): 614–28. http://dx.doi.org/10.9717/kmms.2017.20.4.614.
Full textVitalii Savchenko, Vitalii Savchenko, V. Savchenko, T. Dzyuba, et al. "Time Aspect of Insider Threat Mitigation." Advances in Military Technology 19, no. 1 (2024): 149–64. http://dx.doi.org/10.3849/aimt.01830.
Full textPriya, P. Mohana, and Abhijit Ranganathan. "Cyber Awareness Learning Imitation Environment (CALIE): A Card Game to provide Cyber Security Awareness for Various Group of Practitioners." International Journal of Advanced Networking and Applications 14, no. 02 (2022): 5334–41. http://dx.doi.org/10.35444/ijana.2022.14203.
Full textR M, Punith, and Priya D. "DeepMIA: An Integrated and Accelerated approach for Malicious Insider Attack Detection in IOT using Deep Learning." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 1585–93. http://dx.doi.org/10.22214/ijraset.2022.45407.
Full textLi, Xiong, Jianwei Niu, Muhammad Khurram Khan, and Zhibo Wang. "Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme." Mathematical Problems in Engineering 2013 (2013): 1–10. http://dx.doi.org/10.1155/2013/910409.
Full textAgrafiotis, Ioannis, Jason RC Nurse, Oliver Buckley, Phil Legg, Sadie Creese, and Michael Goldsmith. "Identifying attack patterns for insider threat detection." Computer Fraud & Security 2015, no. 7 (2015): 9–17. http://dx.doi.org/10.1016/s1361-3723(15)30066-x.
Full textDib, Marc, and Samuel Pierre. "Insider Attack Model Against HSM-Based Architecture." IEEE Access 11 (2023): 86848–58. http://dx.doi.org/10.1109/access.2023.3304994.
Full textNoor Afiza Mohd Ariffin and Vanitha Paliah. "An Improved Secure Authentication in Lightweight IoT." Journal of Advanced Research in Applied Sciences and Engineering Technology 31, no. 3 (2023): 191–207. http://dx.doi.org/10.37934/araset.31.3.191207.
Full textQu, Juan, and Li-min Zou. "An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme." Journal of Electrical and Computer Engineering 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/786587.
Full textEgreira Ali Abuhamra, Eng Abdalgader. "Concept of Network security." International Journal of Advances in Engineering and Management 7, no. 3 (2025): 384–90. https://doi.org/10.35629/5252-0703384390.
Full textDeep, Gaurav, Rajni Mohana, Anand Nayyar, P. Sanjeevikumar, and Eklas Hossain. "Authentication Protocol for Cloud Databases Using Blockchain Mechanism." Sensors 19, no. 20 (2019): 4444. http://dx.doi.org/10.3390/s19204444.
Full textLallie, Harjinder Singh, Andrew Thompson, Elzbieta Titis, and Paul Stephens. "Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector." Computers 14, no. 2 (2025): 49. https://doi.org/10.3390/computers14020049.
Full textYang, Chun-Wei, Jason Lin, Chia-Wei Tsai, and Ching-Lin Cheng. "Cryptanalysis of a Semi-Quantum Bi-Signature Scheme Based on W States." Entropy 24, no. 10 (2022): 1408. http://dx.doi.org/10.3390/e24101408.
Full textMd., Hasan Furhad, K. Chakrabortty Ripon, J. Ryan Michael, Uddin Jia, and H. Sarker Iqbal. "A hybrid framework for detecting structured query language injection attacks in web-based applications." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5405–14. https://doi.org/10.11591/ijece.v12i5.pp5405-5414.
Full textDas, Manik Lal, and Riddhi Solani. "iCOPS: insider attack detection in distributed file systems." International Journal of Social Computing and Cyber-Physical Systems 2, no. 3 (2021): 244. http://dx.doi.org/10.1504/ijsccps.2021.10041256.
Full textSolani, Riddhi, and Manik Lal Das. "iCOPS: insider attack detection in distributed file systems." International Journal of Social Computing and Cyber-Physical Systems 2, no. 3 (2021): 244. http://dx.doi.org/10.1504/ijsccps.2021.117972.
Full textMokhor, Volodymyr, Hryhorii Kravtsov, and Ihor Kotsiuba. "Assessment of insider attack with learning statistics methods." Collection "Information technology and security" 3, no. 2 (2015): 88–95. http://dx.doi.org/10.20535/2411-1031.2015.3.2.60881.
Full textWang, Feifei, Guoai Xu, Chenyu Wang, and Junhao Peng. "A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment." Security and Communication Networks 2019 (June 25, 2019): 1–15. http://dx.doi.org/10.1155/2019/2838615.
Full textOberoi, Priya, Sumit Mittal, and Rajneesh Kumar Gujral. "ADRCN: A Framework to Detect and Mitigate Malicious Insider Attacks in Cloud-Based Environment on IaaS." International Journal of Mathematical, Engineering and Management Sciences 4, no. 3 (2019): 654–70. http://dx.doi.org/10.33889//ijmems.2019.4.3-052.
Full textAn, Younghwa. "Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards." Journal of Biomedicine and Biotechnology 2012 (2012): 1–6. http://dx.doi.org/10.1155/2012/519723.
Full textMarepalli, Radha, and Rao C.V.Guru. "PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HOLE ATTACK:ISSUES AND CHALLENGES." International Journal of Security, Privacy and Trust Management ( IJSPTM ) 7, no. 2 (2020): 1–8. https://doi.org/10.5281/zenodo.3980700.
Full textDeep, Gaurav, Jagpreet Sidhu, and Rajni Mohana. "Access Management of User and Cyber-Physical Device in DBaaS according to Indian IT Laws using Blockchain." Scalable Computing: Practice and Experience 21, no. 3 (2020): 407–24. http://dx.doi.org/10.12694/scpe.v21i3.1737.
Full textLu, Yang, and Jiguo Li. "Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/295419.
Full textGunasekhar, T., K. Thirupathi Rao, V. Krishna Reddy, P. Sai Kiran, and B. Thirumala Rao. "Mitigation of Insider Attacks through Multi-Cloud." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 1 (2015): 136. http://dx.doi.org/10.11591/ijece.v5i1.pp136-141.
Full textSaranjame, Rahul, and Manik Lal Das. "Securing Digital Image from Malicious Insider Attacks." International Journal of Computer Vision and Image Processing 8, no. 2 (2018): 49–58. http://dx.doi.org/10.4018/ijcvip.2018040103.
Full textFurhad, Md Hasan, Ripon K. Chakrabortty, Michael J. Ryan, Jia Uddin, and Iqbal H. Sarker. "A hybrid framework for detecting structured query language injection attacks in web-based applications." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5405. http://dx.doi.org/10.11591/ijece.v12i5.pp5405-5414.
Full textClaycomb, William, and Dongwan Shin. "A User Controlled Approach for Securing Sensitive Information in Directory Services." JUCS - Journal of Universal Computer Science 15, no. (15) (2009): 2999–3018. https://doi.org/10.3217/jucs-015-15-2999.
Full textNam, Junghyun, Kim-Kwang Raymond Choo, Junghwan Kim, et al. "Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model." Scientific World Journal 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/825072.
Full textLee, Yung Cheng, and Pei Ju Lee. "Cryptanalysis of Ahirwal-Sonwanshi ID-Based Remote User Authentication Scheme." Applied Mechanics and Materials 764-765 (May 2015): 858–62. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.858.
Full textBoobalan, P. "Real-time Insider Attack Detection using Graph-Based Anomaly Detection and Concept Drift Handling." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 6221–27. https://doi.org/10.22214/ijraset.2025.69840.
Full textJungSook Kim. "Design and Implementation of the Insider Attack Detection System." Journal of Convergence Information Technology 6, no. 12 (2011): 220–28. http://dx.doi.org/10.4156/jcit.vol6.issue12.28.
Full textS, Kalaivani, Haripriya S, Mallesan C, and Jayanthi A. "Adaptive KPSD Model for Insider Attack Detection in VANET." International Journal of Engineering Trends and Technology 9, no. 3 (2014): 146–50. http://dx.doi.org/10.14445/22315381/ijett-v9p229.
Full textRajamanickam, Siranjeevi, Satyanarayana Vollala, and N. Ramasubramanian. "Insider Attack Prevention: LAPUP—Lightweight Authentication Protocol Using PUF." Journal of Communications and Information Networks 9, no. 2 (2024): 192–206. http://dx.doi.org/10.23919/jcin.2024.10582825.
Full textKhan, Ahmed Yar, Rabia Latif, Seemab Latif, Shahzaib Tahir, Gohar Batool, and Tanzila Saba. "Malicious Insider Attack Detection in IoTs Using Data Analytics." IEEE Access 8 (2020): 11743–53. http://dx.doi.org/10.1109/access.2019.2959047.
Full textLi, Hongtu, Liang Hu, Wei Yuan, Hongwei Li, and Jianfeng Chu. "Insider Attack on A Password-Based Group Key Agreement." Procedia Engineering 15 (2011): 1700–1704. http://dx.doi.org/10.1016/j.proeng.2011.08.317.
Full textShunmuganathan, Saraswathi, Renuka Devi Saravanan, and Yogesh Palanichamy. "Securing VPN from insider and outsider bandwidth flooding attack." Microprocessors and Microsystems 79 (November 2020): 103279. http://dx.doi.org/10.1016/j.micpro.2020.103279.
Full textCho, Youngho, and Gang Qu. "A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks." Sensors 23, no. 9 (2023): 4407. http://dx.doi.org/10.3390/s23094407.
Full textBuinevich, Mikhail, and Grigory Moiseenko. "Combining of Heterogeneous Destructive Impact on the Information System and Countering Attacks (on Example by Insider Activity and DDoS-Attack)." Telecom IT 11, no. 3 (2023): 27–36. http://dx.doi.org/10.31854/2307-1303-2023-11-3-27-36.
Full text