Academic literature on the topic 'Insider threat'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Insider threat.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Insider threat"
Alsowail, Rakan A., and Taher Al-Shehari. "A Multi-Tiered Framework for Insider Threat Prevention." Electronics 10, no. 9 (2021): 1005. http://dx.doi.org/10.3390/electronics10091005.
Full textMohammad, Nur Ameera Natasha, Warusia Mohamed Yassin, Rabiah Ahmad, Aslinda Hassan, and Mohammed Nasser Ahmed Al Mhiqani. "An Insider Threat Categorization Framework for Automated Manufacturing Execution System." International Journal of Innovation in Enterprise System 3, no. 02 (2019): 31–41. http://dx.doi.org/10.25124/ijies.v3i02.38.
Full textPalaparthy, Keerthana, Y. Manohar Reddy, Jatoth Victor Paul, and S. Raju. "Enhancing Insider Threat Detection through Integrated Behavioral, Signature and Anomaly based Detection Methods." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem39835.
Full textAnatoly, Adamovich Kornienko, and Aleksandrovich Polyanichko Mark. "Insider Detection Method in a Company." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 2 (2019): 585–92. https://doi.org/10.35940/ijeat.A1452.129219.
Full textMohammed, Nasser Al-Mhiqani, Ahmad Rabiah, Zainal Abidin Zaheera, Yassin Warusia, Hassan Aslinda, and Natasha Mohammad Ameera. "New insider threat detection method based on recurrent neural networks." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 17, no. 3 (2020): 1474–79. https://doi.org/10.11591/ijeecs.v17.i3.pp1474-1479.
Full textAl-Mhiqani, Mohammed Nasser, Rabiah Ahmad, Z. Zainal Abidin, et al. "A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations." Applied Sciences 10, no. 15 (2020): 5208. http://dx.doi.org/10.3390/app10155208.
Full textNasser Al-mhiqani, Mohammed, Rabiah Ahmad, Zaheera Zainal Abidin, Warusia Yassin, Aslinda Hassan, and Ameera Natasha Mohammad. "New insider threat detection method based on recurrent neural networks." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (2020): 1474. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1474-1479.
Full textLuqman Hakim. "Insider Threats: The Cybersecurity Analysis using OCTAVE Allegro which are combined with HAIS-Q." Uranus : Jurnal Ilmiah Teknik Elektro, Sains dan Informatika 3, no. 1 (2025): 36–47. https://doi.org/10.61132/uranus.v3i1.649.
Full textAdikari, Swini. "Countering the Threat of Nuclear Terrorism Arising from Malicious Insiders." Global Affairs Review 1, no. 2 (2021): 1–18. http://dx.doi.org/10.51330/gar.0020214.
Full textKim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. http://dx.doi.org/10.3390/app9194018.
Full textDissertations / Theses on the topic "Insider threat"
Munshi, Asmaa Mahdi. "A study of insider threat behaviour: developing a holistic insider threat model." Thesis, Curtin University, 2013. http://hdl.handle.net/20.500.11937/1668.
Full textBlack, Alan. "Managing the aviation insider threat." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5039.
Full textSchluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.
Full textMcKinney, Steven. "Insider Threat: User Identification Via Process Profiling." NCSU, 2008. http://www.lib.ncsu.edu/theses/available/etd-05092008-154325/.
Full textMagklaras, Georgios Vasilios. "An insider misuse threat detection and prediction language." Thesis, University of Plymouth, 2012. http://hdl.handle.net/10026.1/1024.
Full textRocha, Francisco. "Insider threat : memory confidentiality and integrity in the cloud." Thesis, University of Newcastle upon Tyne, 2015. http://hdl.handle.net/10443/2960.
Full textElmrabit, Nebrase. "A multiple-perspective approach for insider-threat risk prediction in cyber-security." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/36243.
Full textCallahan, Christopher J. "Security information and event management tools and insider threat detection." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37596.
Full textJenkins, Jeffrey Lyne. "Alleviating Insider Threats: Mitigation Strategies and Detection Techniques." Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/297023.
Full textHashem, Yassir. "Multi-Modal Insider Threat Detection and Prevention based on Users' Behaviors." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc1248460/.
Full textBooks on the topic "Insider threat"
Godse, Vinayak. The threat within: A study on insider threat by DSCI in collaboration with PwC. Data Security Council of India, 2011.
Find full text1954-, Hoffman Bruce, United States. Dept. of Energy., and Rand Corporation, eds. Insider crime: The threat to nuclear facilities and programs. Rand Corp., 1990.
Find full text1939-, Anderson Robert H., United States. Advanced Research and Development Activity, and Rand Corporation, eds. Understanding the insider threat: Proceedings of a March 2004 workshop. RAND, 2004.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Examining insider threat risk at the U.S.Citizenship and Immigration Services. U.S. Dept. of Homeland Security, Office of Inspector General, 2011.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Transportation Security Administration has taken steps to address the insider threat but challenges remain (redacted). Department of Homeland Security, Office of Inspector General, 2012.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. U.S. Customs and Border Protection has taken steps to address insider threat, but challenges remain (redacted). Department of Homeland Security, Office of Inspector General, 2013.
Find full textCarneiro, Anabela. Market power, dismissal threat and rent sharing: The role of insider and outsider forces in wage bargaining. IZA, 2006.
Find full textOcasio, William. Failure-induced change and threat-rigidity under economic adversity: The case of insider vs. outsider CEO succession. Alfred P. Sloan School of Management, Massachusetts Institute of Technology, 1993.
Find full text1939-, Anderson Robert H., and National Defense Research Institute (U.S.), eds. Research on mitigating the insider threat to information systems--#2: Proceedings of a workshop held August, 2000. RAND, 2000.
Find full textArduin, Pierre-Emmanuel. Insider Threats. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119419785.
Full textBook chapters on the topic "Insider threat"
Bore, James. "Insider Threat." In Advanced Sciences and Technologies for Security Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-35746-7_19.
Full textWilliams, Adam D., Shannon N. Abbott, and Adriane C. Littlefield. "Insider Threat." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_156-1.
Full textWilliams, Adam D., Shannon N. Abbott, and Adriane C. Littlefield. "Insider Threat." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_156-2.
Full textBishop, Matt. "Insider Threat." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1586-1.
Full textWilliams, Adam D., Shannon N. Abbott, and Adriane C. Littlefield. "Insider Threat." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_156.
Full textBishop, Matt. "Insider Threat." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1586.
Full textSkorich, Pierre, and Matthew Manning. "Organisational assets at the centre." In Insider Threat. Routledge, 2024. http://dx.doi.org/10.4324/9781003055716-3.
Full textSkorich, Pierre, and Matthew Manning. "Understanding and categorising beneficiaries." In Insider Threat. Routledge, 2024. http://dx.doi.org/10.4324/9781003055716-5.
Full textSkorich, Pierre, and Matthew Manning. "Understanding opportunity." In Insider Threat. Routledge, 2024. http://dx.doi.org/10.4324/9781003055716-4.
Full textSkorich, Pierre, and Matthew Manning. "Thinking about motivation." In Insider Threat. Routledge, 2024. http://dx.doi.org/10.4324/9781003055716-6.
Full textConference papers on the topic "Insider threat"
Manoharan, Phavithra, Jiao Yin, Hua Wang, Yanchun Zhang, and Wenjie Ye. "Insider Threat Detection: A Review." In 2024 International Conference on Networking and Network Applications (NaNA). IEEE, 2024. http://dx.doi.org/10.1109/nana63151.2024.00031.
Full textKim, Yujun, Deok-Han Kim, and Young-Gab Kim. "Transfer Learning-Based Robust Insider Threat Detection." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00315.
Full textYang, Menghua, Junkai Yi, Hejun Zhu, and Lingling Tan. "CNN-LSTM-Based Insider Threat Detection Model." In 2025 International Conference on Electrical Automation and Artificial Intelligence (ICEAAI). IEEE, 2025. https://doi.org/10.1109/iceaai64185.2025.10957184.
Full textCui, Lei, Yechao Wang, Zhenyue Long, Jinbo Wang, Wuqiang Shen, and Jian Wang. "Insider Threat Detection Based on Personalized User Modeling." In 2024 7th International Conference on Computer Information Science and Application Technology (CISAT). IEEE, 2024. http://dx.doi.org/10.1109/cisat62382.2024.10695344.
Full textBaghalizadeh-Moghadam, Neda, Christopher Neal, Frédéric Cuppens, and Nora Boulahia-Cuppens. "NLP and Neural Networks for Insider Threat Detection." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00279.
Full textChen, Chia-Cheng, and Hsing-Kuo Pao. "Reconsider Time Series Analysis for Insider Threat Detection." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10825829.
Full textPrasad, Pennada Siva Satya, Sasmita Kumari Nayak, and M. Vamsi Krishna. "Enhancing Insider Threat Detection with Machine Learning Techniques." In 2024 International Conference on Integrated Intelligence and Communication Systems (ICIICS). IEEE, 2024. https://doi.org/10.1109/iciics63763.2024.10860057.
Full textHo, Shuyuan Mary, Hengyi Fu, Shashanka S. Timmarajus, Cheryl Booth, Jung Hoon Baeg, and Muye Liu. "Insider Threat." In SIGMIS-CPR '15: 2015 Computers and People Research Conference. ACM, 2015. http://dx.doi.org/10.1145/2751957.2751978.
Full textWilliams, Adam, Colton Heffington, Shannon Abbott, et al. "Operationalizing Insider Threat Potential and Risk-Significant Insiders to Enhance Insider Threat Detection and Mitigation." In Annual Meeting - Vienna, , Austria - May - 2023. US DOE, 2023. http://dx.doi.org/10.2172/2431208.
Full textBishop, Matt, Kara Nance, and Jason Clark. "Introduction to Inside the Insider Threat Minitrack." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2017. http://dx.doi.org/10.24251/hicss.2017.318.
Full textReports on the topic "Insider threat"
CALIFORNIA UNIV LOS ANGELES. DoD Insider Threat Mitigation. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada385423.
Full textMontelibano, Joji, and Andrew Moore. Insider Threat Security Reference Architecture. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada609926.
Full textWong, F. Insider Threat Symposium Curated Questions. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1548366.
Full textMaxion, R. A., K. M. Tan, S. S. Killourhy, and T. N. Townsend. Profiler-2000: Attacking the Insider Threat. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada439600.
Full textGibbs, Philip, Robert Larsen, Mike O'Brien, and Jose Rodriquez. Insider Threat Mitigation Workshop Instructional Materials. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/1170579.
Full textShevenell, Michael John. A Scalable HPC Insider Threat Monitoring System. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1489161.
Full textGibbs, Philip, Robert Larsen, Mike O'Brien, and Tom Edmunds. Advanced Insider Threat Mitigation Workshop Instructional Materials. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/1167146.
Full textGibbs, Philip, Robert Larsen, Mike O Brien, and Tom Edmunds. Advanced insider threat mitigation workshop instructional materials. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/1167421.
Full textHanley, Michael, and Joji Montelibano. Insider Threat Control: Using Centralized Logging to Detect Data Exfiltration Near Insider Termination. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada610463.
Full textPope, Noah Gale, Martha Williams, Joel Lewis, and Thomas Pham. Taking Steps to Protect Against the Insider Threat. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1223757.
Full text