Academic literature on the topic 'Insider attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Insider attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Insider attacks"
Henge, Santosh Kumar, Aditya Upadhyay, Ashok Kumar Saini, Neha Mishra, Dimpal Sharma, and Gajanand Sharma. "Analysis and detection of insider attacks using behaviour rule based architecture in enterprise multitenancy." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 707–18. http://dx.doi.org/10.47974/jdmsc-1743.
Full textNguyen, Minh-Duong, Ngoc-Tu Chau, Seungwook Jung, and Souhwan Jung. "A Demonstration of Malicious Insider Attacks inside Cloud IaaS Vendor." International Journal of Information and Education Technology 4, no. 6 (2014): 483–86. http://dx.doi.org/10.7763/ijiet.2014.v4.455.
Full textGlancy, Fletcher, David P. Biros, Nan Liang, and Andy Luse. "Classification of malicious insiders and the association of the forms of attacks." Journal of Criminal Psychology 10, no. 3 (2020): 233–47. http://dx.doi.org/10.1108/jcp-03-2020-0012.
Full textM, Rama Bai, and Bin Saad Quraishi Maaz. "Privacy Protection Against Insider Attacks." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 576–78. https://doi.org/10.35940/ijeat.E9744.069520.
Full textAl-Shehari, Taher, and Rakan A. Alsowail. "An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques." Entropy 23, no. 10 (2021): 1258. http://dx.doi.org/10.3390/e23101258.
Full textSoleh, Musdi Muhammad. "A Study Case in NTMC POLRI: Reducing Data Breach Risk from Insider Threats by Using Risk IT Framework." ACMIT Proceedings 3, no. 1 (2019): 171–79. http://dx.doi.org/10.33555/acmit.v3i1.41.
Full textLynch, David M. "Securing Against Insider Attacks." EDPACS 34, no. 1 (2006): 10–20. http://dx.doi.org/10.1201/1079.07366981/46107.34.1.20060701/93701.2.
Full textLynch, David M. "Securing Against Insider Attacks." Information Systems Security 15, no. 5 (2006): 39–47. http://dx.doi.org/10.1201/1086.1065898x/46353.15.4.20060901/95430.6.
Full textAbulencia, Jesse. "Insider attacks: human-factors attacks and mitigation." Computer Fraud & Security 2021, no. 5 (2021): 14–17. http://dx.doi.org/10.1016/s1361-3723(21)00054-3.
Full textNasraddin, Jehan Turki, Eynas Hassan Balkhair, and Dr Manar Salamh. "Detection of Malicious Privileged Access Using a RuleBased Approach." International Journal of Engineering Research and Applications 14, no. 10 (2024): 63–72. http://dx.doi.org/10.9790/9622-14106372.
Full textDissertations / Theses on the topic "Insider attacks"
Nsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Full textDoss, Gary. "An Approach to Effectively Identify Insider Attacks within an Organization." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/138.
Full textUsmani, Wali Ahmed. "Not able to resist the urge : social insider attacks on Facebook." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/60294.
Full textAditham, Santosh. "Mitigation of Insider Attacks for Data Security in Distributed Computing Environments." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6639.
Full textJUNG, SANG SHIN. "Attacking and Securing Beacon-Enabled 802.15.4 Networks." Digital Archive @ GSU, 2011. http://digitalarchive.gsu.edu/cs_theses/74.
Full textKambhampaty, Krishna Kanth. "Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/29914.
Full textRadhouani, Amira. "Méthodes formelles pour l'extraction d'attaques internes des Systèmes d'Information." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM025/document.
Full textKrauß, Christoph. "Handling Insider Attacks in Wireless Sensor Networks." Phd thesis, 2010. https://tuprints.ulb.tu-darmstadt.de/2158/1/Dissertation_ckrauss.pdf.
Full textChen, Chien-Hung, and 陳建宏. "Using Subliminal Channel Mechanism to Defend Against the Insider Attacks." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/52904837083392712115.
Full textKrauß, Christoph [Verfasser]. "Handling insider attacks in wireless sensor networks / vorgelegt von Christoph Krauß." 2010. http://d-nb.info/1003545335/34.
Full textBooks on the topic "Insider attacks"
Brancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Auerbach Publications, 2007.
Find full textStolfo, Salvatore J., Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, and Sara Sinclair, eds. Insider Attack and Cyber Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-77322-3.
Full textStorad, Conrad J. Inside AIDS: HIV attacks the immune system. Lerner Publications Co., 1998.
Find full textWorkshop on Insider Attack and Cyber Security (1st : 2007 : Washington, D.C.), ed. Insider attack and cyber security: Beyond the hacker. Springer, 2008.
Find full textYang, Qing, and Lin Huang. Inside Radio: An Attack and Defense Guide. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8447-8.
Full textSchreyer, Paul. Inside 9/11: Neue Fakten und Hintergründe zehn Jahre danach. Kai Homilius Verlag, 2011.
Find full textBook chapters on the topic "Insider attacks"
Sundararajan, Sudharsan, Hari Narayanan, Vipin Pavithran, Kaladhar Vorungati, and Krishnashree Achuthan. "Preventing Insider Attacks in the Cloud." In Advances in Computing and Communications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22709-7_48.
Full textDagon, David, Wenke Lee, and Richard Lipton. "Protecting Secret Data from Insider Attacks." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11507840_2.
Full textSattarzadeh, Behnam, and Mehran S. Fallah. "Is Cryptyc Able to Detect Insider Attacks?" In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29420-4_15.
Full textvan Deursen, Ton, and Saša Radomirović. "Insider Attacks and Privacy of RFID Protocols." In Public Key Infrastructures, Services and Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29804-2_6.
Full textHao, Yiru, Saru Kumari, Kuruva Lakshmanna, and Chien-Ming Chen. "Privileged Insider Attacks on Two Authentication Schemes." In Advances in Smart Vehicular Technology, Transportation, Communication and Applications. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-0848-6_41.
Full textIbrahim, Amjad, Simon Rehwald, Antoine Scemama, Florian Andres, and Alexander Pretschner. "Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks." In Graphical Models for Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62230-5_1.
Full textPattabiraman, Karthik, Nithin Nakka, Zbigniew Kalbarczyk, and Ravishankar Iyer. "Discovering Application-Level Insider Attacks Using Symbolic Execution." In Emerging Challenges for Security, Privacy and Trust. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01244-0_6.
Full textCamacho, Pedro, Bruno Cabral, and Jorge Bernardino. "Insider Attacks in a Non-secure Hadoop Environment." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56538-5_54.
Full textConstantinides, Argyris, Marios Belk, Christos Fidas, and Andreas Pitsillides. "Understanding Insider Attacks in Personalized Picture Password Schemes." In Human-Computer Interaction – INTERACT 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-85610-6_42.
Full textUpadhyaya, Shambhu. "Real-Time Intrusion Detection with Emphasis on Insider Attacks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45215-7_6.
Full textConference papers on the topic "Insider attacks"
Zewdie, Marshet, Anteneh Girma, and Tilahun Melak Sitote. "Deep Neural Networks for Detecting Insider Threats and Social Engineering Attacks." In 2024 International Conference on Electrical, Computer and Energy Technologies (ICECET). IEEE, 2024. http://dx.doi.org/10.1109/icecet61485.2024.10698519.
Full textSivanagireddy, K., S. Jagadeesh, K. Suresh Kumar, B. A. Chandrika, M. Kranthi Kumar, and P. Rajalingam. "Detecting and Mitigating Insider Threat Attacks in Cloud using Machine Learning." In 2024 IEEE 6th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA). IEEE, 2024. https://doi.org/10.1109/icccmla63077.2024.10871803.
Full textAltarawneh, Amani, and Jemima Owusu-Tweneboah. "Assessing the Resilience of BFT-Raft Consensus Against Insider DoS Attacks in Blockchain." In 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2025. https://doi.org/10.1109/ccwc62904.2025.10903681.
Full textAmri, Jamel, Egil Gulbrandsen, and Ricardo P. Nogueira. "Effect of Acetic Acid on Propagation and Stifling of Localized Attacks in CO2 Corrosion of Carbon Steel." In CORROSION 2009. NACE International, 2009. https://doi.org/10.5006/c2009-09284.
Full textMarek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.
Full textDuncan, Adrian J., Sadie Creese, and Michael Goldsmith. "Insider Attacks in Cloud Computing." In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2012. http://dx.doi.org/10.1109/trustcom.2012.188.
Full textUsmani, Wali Ahmed, Diogo Marques, Ivan Beschastnikh, Konstantin Beznosov, Tiago Guerreiro, and Luís Carriço. "Characterizing Social Insider Attacks on Facebook." In CHI '17: CHI Conference on Human Factors in Computing Systems. ACM, 2017. http://dx.doi.org/10.1145/3025453.3025901.
Full textKul, Gokhan, Shambhu Upadhyaya, and Andrew Hughes. "Complexity of Insider Attacks to Databases." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3139923.3139927.
Full textAjayi, Oluwaseyi, and Tarek Saadawi. "Detecting Insider Attacks in Blockchain Networks." In 2021 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2021. http://dx.doi.org/10.1109/isncc52172.2021.9615799.
Full textZhang, Yan-Mei, Zhen-Wei Yu, and Huai-Hu Cao. "Insider Attacks Study Against Mobile IPv6 Protocol." In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2008. http://dx.doi.org/10.1109/wicom.2008.1117.
Full textReports on the topic "Insider attacks"
Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Full textChu, Tsong-Lun, Athi Varuttamaseni, Joo-Seok Baek, and Susan Pepper. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1329799.
Full textBowen, Brian M., Shlomo Hershkop, Angelos D. Keromytis, and Salvatore J. Stolfo. Baiting Inside Attackers using Decoy Documents. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada500672.
Full textFloyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, 2022. http://dx.doi.org/10.54206/102376/rsfd6862.
Full textHillestad, Torgeir Martin. The Metapsychology of Evil: Main Theoretical Perspectives Causes, Consequences and Critique. University of Stavanger, 2014. http://dx.doi.org/10.31265/usps.224.
Full text