Academic literature on the topic 'Insider threat'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Insider threat.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Insider threat"

1

Alsowail, Rakan A., and Taher Al-Shehari. "A Multi-Tiered Framework for Insider Threat Prevention." Electronics 10, no. 9 (2021): 1005. http://dx.doi.org/10.3390/electronics10091005.

Full text
Abstract:
As technologies are rapidly evolving and becoming a crucial part of our lives, security and privacy issues have been increasing significantly. Public and private organizations have highly confidential data, such as bank accounts, military and business secrets, etc. Currently, the competition between organizations is significantly higher than before, which triggers sensitive organizations to spend an excessive volume of their budget to keep their assets secured from potential threats. Insider threats are more dangerous than external ones, as insiders have a legitimate access to their organizati
APA, Harvard, Vancouver, ISO, and other styles
2

Mohammad, Nur Ameera Natasha, Warusia Mohamed Yassin, Rabiah Ahmad, Aslinda Hassan, and Mohammed Nasser Ahmed Al Mhiqani. "An Insider Threat Categorization Framework for Automated Manufacturing Execution System." International Journal of Innovation in Enterprise System 3, no. 02 (2019): 31–41. http://dx.doi.org/10.25124/ijies.v3i02.38.

Full text
Abstract:
Insider threats become one of the most dangerous threats in the cyber world as compared to outsider as the insiders have knowledge of assets. In addition, the threats itself considered in-visible and no one can predict what, when and how exactly the threat launched. Based on conducting literature, threat in Automated Manufacturing Execution Systems (AMESs) can be divided into three principle factors. Moreover, there is no standard framework to be referring which exist nowadays to categorize such factors in order to identify insider threats possible features. Therefore, from the conducted liter
APA, Harvard, Vancouver, ISO, and other styles
3

Palaparthy, Keerthana, Y. Manohar Reddy, Jatoth Victor Paul, and S. Raju. "Enhancing Insider Threat Detection through Integrated Behavioral, Signature and Anomaly based Detection Methods." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem39835.

Full text
Abstract:
Insider threats present substantial risks to organizational security, as malicious actors exploit their authorized access to systems, networks, or data to perpetrate harmful activities. These threats encompass various forms, including data theft, sabotage, fraud, or espionage, leading to significant financial losses, reputational damage, or regulatory penalties. Traditional approaches to insider threat detection, such as anomaly-based, signature-based, and behavioral analysis methods, have inherent limitations, including high false positives, reliance on known patterns, and lack of contextual
APA, Harvard, Vancouver, ISO, and other styles
4

Anatoly, Adamovich Kornienko, and Aleksandrovich Polyanichko Mark. "Insider Detection Method in a Company." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 2 (2019): 585–92. https://doi.org/10.35940/ijeat.A1452.129219.

Full text
Abstract:
Managers often focus on external threats mainly due to the difficulties in evaluating the losses from the insider activities. The purpose of the study is to improve the efficient performance of an information security department and a company itself in counteracting insider threats by increasing the accuracy and rate of assessing the insider threat for each employee and ranking employees in accordance with the assessment of a summarized technical threat indicator. The authors morphologically analyze the features of insider activities in three sections and identify a promising area for combatin
APA, Harvard, Vancouver, ISO, and other styles
5

Mohammed, Nasser Al-Mhiqani, Ahmad Rabiah, Zainal Abidin Zaheera, Yassin Warusia, Hassan Aslinda, and Natasha Mohammad Ameera. "New insider threat detection method based on recurrent neural networks." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 17, no. 3 (2020): 1474–79. https://doi.org/10.11591/ijeecs.v17.i3.pp1474-1479.

Full text
Abstract:
Insider threat is a significant challenge in cybersecurity. In comparison with outside attackers, inside attackers have more privileges and legitimate access to information and facilities that can cause considerable damage to an organization. Most organizations that implement traditional cybersecurity techniques, such as intrusion detection systems, fail to detect insider threats given the lack of extensive knowledge on insider behavior patterns. However, a sophisticated method is necessary for an in-depth understanding of insider activities that the insider performs in the organization. In th
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Mhiqani, Mohammed Nasser, Rabiah Ahmad, Z. Zainal Abidin, et al. "A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations." Applied Sciences 10, no. 15 (2020): 5208. http://dx.doi.org/10.3390/app10155208.

Full text
Abstract:
Insider threat has become a widely accepted issue and one of the major challenges in cybersecurity. This phenomenon indicates that threats require special detection systems, methods, and tools, which entail the ability to facilitate accurate and fast detection of a malicious insider. Several studies on insider threat detection and related areas in dealing with this issue have been proposed. Various studies aimed to deepen the conceptual understanding of insider threats. However, there are many limitations, such as a lack of real cases, biases in making conclusions, which are a major concern an
APA, Harvard, Vancouver, ISO, and other styles
7

Nasser Al-mhiqani, Mohammed, Rabiah Ahmad, Zaheera Zainal Abidin, Warusia Yassin, Aslinda Hassan, and Ameera Natasha Mohammad. "New insider threat detection method based on recurrent neural networks." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (2020): 1474. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1474-1479.

Full text
Abstract:
<p>Insider threat is a significant challenge in cybersecurity. In comparison with outside attackers, inside attackers have more privileges and legitimate access to information and facilities that can cause considerable damage to an organization. Most organizations that implement traditional cybersecurity techniques, such as intrusion detection systems, fail to detect insider threats given the lack of extensive knowledge on insider behavior patterns. However, a sophisticated method is necessary for an in-depth understanding of insider activities that the insider performs in the organizati
APA, Harvard, Vancouver, ISO, and other styles
8

Luqman Hakim. "Insider Threats: The Cybersecurity Analysis using OCTAVE Allegro which are combined with HAIS-Q." Uranus : Jurnal Ilmiah Teknik Elektro, Sains dan Informatika 3, no. 1 (2025): 36–47. https://doi.org/10.61132/uranus.v3i1.649.

Full text
Abstract:
There are various types of cybersecurity threat in the globe, one of which is an insider threat. Because the current vulnerability generates an insider threat, SMEs suffer. In this situation, the company suffers a loss of profit and trust. Because of the speed and intensity of cybersecurity, particularly internal threats, SMEs must conduct regular vulnerability assessments. Insider threats to cyber security are a major issue in today's environment. Insider threats come in a variety of flavours, one of which is the unintended insider threat, or UIsT. This type of threat is a real one, and it is
APA, Harvard, Vancouver, ISO, and other styles
9

Adikari, Swini. "Countering the Threat of Nuclear Terrorism Arising from Malicious Insiders." Global Affairs Review 1, no. 2 (2021): 1–18. http://dx.doi.org/10.51330/gar.0020214.

Full text
Abstract:
Nuclear theft from malicious insiders is a significant threat to Pakistan’s nuclear weapons arsenal. Pakistan is a member of the Convention of the Physical Protection of Nuclear Material (CPPNM), which is an international agreement that adheres to the protection of nuclear materials and the recovery of stolen nuclear materials. However, this agreement does not specifically take into account the risk of security breaches arising from malicious insiders due to Pakistan’s rapidly growing nuclear arsenal. The purpose of this paper is to examine the heightened risk of insider threats in conjunction
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. http://dx.doi.org/10.3390/app9194018.

Full text
Abstract:
Insider threats are malicious activities by authorized users, such as theft of intellectual property or security information, fraud, and sabotage. Although the number of insider threats is much lower than external network attacks, insider threats can cause extensive damage. As insiders are very familiar with an organization’s system, it is very difficult to detect their malicious behavior. Traditional insider-threat detection methods focus on rule-based approaches built by domain experts, but they are neither flexible nor robust. In this paper, we propose insider-threat detection methods based
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Insider threat"

1

Munshi, Asmaa Mahdi. "A study of insider threat behaviour: developing a holistic insider threat model." Thesis, Curtin University, 2013. http://hdl.handle.net/20.500.11937/1668.

Full text
Abstract:
This study investigates the factors that influence the insider threat behaviour. The research aims to develop a holistic view of insider threat behaviour and ways to manage it. This research adopts an Explanatory Mixed Methods approach for the research process. Firstly, the researcher collects the quantitative data and then the qualitative data. In the first phase, the holistic insider threat model is developed; in the second phase, best practices are developed to manage the threat.
APA, Harvard, Vancouver, ISO, and other styles
2

Black, Alan. "Managing the aviation insider threat." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5039.

Full text
Abstract:
CHDS State/Local<br>Approved for public release; distribution is unlimited<br>Despite enhancements to aviation security since September 11, 2001, there remain vulnerabilities from employees at airports. This threat results from airline/airport employees that have access to sensitive and restricted areas during the normal course of their required duties. This thesis evaluates the threat and the measures in place to prevent attacks from aviation insiders. In addition, it evaluates a measure commonly referred to as 100 percent employee screening. Finally, the thesis derives recommendations to enh
APA, Harvard, Vancouver, ISO, and other styles
3

Schluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.

Full text
Abstract:
<p> Malicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's critical information and have intentionally misused that access in a manner that compromised the organization. Although incidents initiated by malicious insiders are fewer in number than those initiated by external threats, insider incidents are more costly on average because the threat is already trusted by the organization and often has privileged access to the organization's most sensitive information. In spite of
APA, Harvard, Vancouver, ISO, and other styles
4

McKinney, Steven. "Insider Threat: User Identification Via Process Profiling." NCSU, 2008. http://www.lib.ncsu.edu/theses/available/etd-05092008-154325/.

Full text
Abstract:
The issue of insider threat is one that organizations have dealt with for many years. Insider threat research began in the early 80's, but has yet to provide satisfactory results despite the fact that insiders pose a greater threat to organizations than external attackers. One of the key issues relating to this problem is that the amount of collectable data is enormous and it is currently impossible to analyze all of it, for each insider, in a timely manner. The purpose of this research is to analyze a portion of this collectable data, process usage, and determine if this data is useful in ide
APA, Harvard, Vancouver, ISO, and other styles
5

Magklaras, Georgios Vasilios. "An insider misuse threat detection and prediction language." Thesis, University of Plymouth, 2012. http://hdl.handle.net/10026.1/1024.

Full text
Abstract:
Numerous studies indicate that amongst the various types of security threats, the problem of insider misuse of IT systems can have serious consequences for the health of computing infrastructures. Although incidents of external origin are also dangerous, the insider IT misuse problem is difficult to address for a number of reasons. A fundamental reason that makes the problem mitigation difficult relates to the level of trust legitimate users possess inside the organization. The trust factor makes it difficult to detect threats originating from the actions and credentials of individual users. A
APA, Harvard, Vancouver, ISO, and other styles
6

Rocha, Francisco. "Insider threat : memory confidentiality and integrity in the cloud." Thesis, University of Newcastle upon Tyne, 2015. http://hdl.handle.net/10443/2960.

Full text
Abstract:
The advantages of always available services, such as remote device backup or data storage, have helped the widespread adoption of cloud computing. However, cloud computing services challenge the traditional boundary between trusted inside and untrusted outside. A consumer’s data and applications are no longer in premises, fundamentally changing the scope of an insider threat. This thesis looks at the security risks associated with an insider threat. Specifically, we look into the critical challenge of assuring data confidentiality and integrity for the execution of arbitrary software in a cons
APA, Harvard, Vancouver, ISO, and other styles
7

Elmrabit, Nebrase. "A multiple-perspective approach for insider-threat risk prediction in cyber-security." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/36243.

Full text
Abstract:
Currently governments and research communities are concentrating on insider threat matters more than ever, the main reason for this is that the effect of a malicious insider threat is greater than before. Moreover, leaks and the selling of the mass data have become easier, with the use of the dark web. Malicious insiders can leak confidential data while remaining anonymous. Our approach describes the information gained by looking into insider security threats from the multiple perspective concepts that is based on an integrated three-dimensional approach. The three dimensions are human issue,
APA, Harvard, Vancouver, ISO, and other styles
8

Callahan, Christopher J. "Security information and event management tools and insider threat detection." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37596.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Malicious insider activities on military networks can pose a threat to military operations. Early identification of malicious insiders assists in preventing significant damage and reduces the overall insider threat to military networks. Security Information and Event Management (SIEM) tools can be used to identify potential malicious insider activities. SIEM tools provide the ability to normalize and correlate log data from multiple sources on networks. Personnel background investigations and administrative action information can provid
APA, Harvard, Vancouver, ISO, and other styles
9

Jenkins, Jeffrey Lyne. "Alleviating Insider Threats: Mitigation Strategies and Detection Techniques." Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/297023.

Full text
Abstract:
Insider threats--trusted members of an organization who compromise security--are considered the greatest security threat to organizations. Because of ignorance, negligence, or malicious intent, insider threats may cause security breaches resulting in substantial damages to organizations and even society. This research helps alleviate the insider threat through developing mitigation strategies and detection techniques in three studies. Study 1 examines how security controls--specifically depth-of-authentication and training recency--alleviate non-malicious insider threats through encouraging se
APA, Harvard, Vancouver, ISO, and other styles
10

Hashem, Yassir. "Multi-Modal Insider Threat Detection and Prevention based on Users' Behaviors." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc1248460/.

Full text
Abstract:
Insider threat is one of the greatest concerns for information security that could cause more significant financial losses and damages than any other attack. However, implementing an efficient detection system is a very challenging task. It has long been recognized that solutions to insider threats are mainly user-centric and several psychological and psychosocial models have been proposed. A user's psychophysiological behavior measures can provide an excellent source of information for detecting user's malicious behaviors and mitigating insider threats. In this dissertation, we propose a mult
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Insider threat"

1

Godse, Vinayak. The threat within: A study on insider threat by DSCI in collaboration with PwC. Data Security Council of India, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1954-, Hoffman Bruce, United States. Dept. of Energy., and Rand Corporation, eds. Insider crime: The threat to nuclear facilities and programs. Rand Corp., 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1939-, Anderson Robert H., United States. Advanced Research and Development Activity, and Rand Corporation, eds. Understanding the insider threat: Proceedings of a March 2004 workshop. RAND, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Department of Homeland Security. Office of Inspector General. Examining insider threat risk at the U.S.Citizenship and Immigration Services. U.S. Dept. of Homeland Security, Office of Inspector General, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Department of Homeland Security. Office of Inspector General. Transportation Security Administration has taken steps to address the insider threat but challenges remain (redacted). Department of Homeland Security, Office of Inspector General, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Department of Homeland Security. Office of Inspector General. U.S. Customs and Border Protection has taken steps to address insider threat, but challenges remain (redacted). Department of Homeland Security, Office of Inspector General, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Carneiro, Anabela. Market power, dismissal threat and rent sharing: The role of insider and outsider forces in wage bargaining. IZA, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ocasio, William. Failure-induced change and threat-rigidity under economic adversity: The case of insider vs. outsider CEO succession. Alfred P. Sloan School of Management, Massachusetts Institute of Technology, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1939-, Anderson Robert H., and National Defense Research Institute (U.S.), eds. Research on mitigating the insider threat to information systems--#2: Proceedings of a workshop held August, 2000. RAND, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Arduin, Pierre-Emmanuel. Insider Threats. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119419785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Insider threat"

1

Bore, James. "Insider Threat." In Advanced Sciences and Technologies for Security Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-35746-7_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Williams, Adam D., Shannon N. Abbott, and Adriane C. Littlefield. "Insider Threat." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_156-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Williams, Adam D., Shannon N. Abbott, and Adriane C. Littlefield. "Insider Threat." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_156-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bishop, Matt. "Insider Threat." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1586-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Williams, Adam D., Shannon N. Abbott, and Adriane C. Littlefield. "Insider Threat." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bishop, Matt. "Insider Threat." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Skorich, Pierre, and Matthew Manning. "Organisational assets at the centre." In Insider Threat. Routledge, 2024. http://dx.doi.org/10.4324/9781003055716-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Skorich, Pierre, and Matthew Manning. "Understanding and categorising beneficiaries." In Insider Threat. Routledge, 2024. http://dx.doi.org/10.4324/9781003055716-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Skorich, Pierre, and Matthew Manning. "Understanding opportunity." In Insider Threat. Routledge, 2024. http://dx.doi.org/10.4324/9781003055716-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Skorich, Pierre, and Matthew Manning. "Thinking about motivation." In Insider Threat. Routledge, 2024. http://dx.doi.org/10.4324/9781003055716-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Insider threat"

1

Manoharan, Phavithra, Jiao Yin, Hua Wang, Yanchun Zhang, and Wenjie Ye. "Insider Threat Detection: A Review." In 2024 International Conference on Networking and Network Applications (NaNA). IEEE, 2024. http://dx.doi.org/10.1109/nana63151.2024.00031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Yujun, Deok-Han Kim, and Young-Gab Kim. "Transfer Learning-Based Robust Insider Threat Detection." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Menghua, Junkai Yi, Hejun Zhu, and Lingling Tan. "CNN-LSTM-Based Insider Threat Detection Model." In 2025 International Conference on Electrical Automation and Artificial Intelligence (ICEAAI). IEEE, 2025. https://doi.org/10.1109/iceaai64185.2025.10957184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cui, Lei, Yechao Wang, Zhenyue Long, Jinbo Wang, Wuqiang Shen, and Jian Wang. "Insider Threat Detection Based on Personalized User Modeling." In 2024 7th International Conference on Computer Information Science and Application Technology (CISAT). IEEE, 2024. http://dx.doi.org/10.1109/cisat62382.2024.10695344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Baghalizadeh-Moghadam, Neda, Christopher Neal, Frédéric Cuppens, and Nora Boulahia-Cuppens. "NLP and Neural Networks for Insider Threat Detection." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Chia-Cheng, and Hsing-Kuo Pao. "Reconsider Time Series Analysis for Insider Threat Detection." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10825829.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Prasad, Pennada Siva Satya, Sasmita Kumari Nayak, and M. Vamsi Krishna. "Enhancing Insider Threat Detection with Machine Learning Techniques." In 2024 International Conference on Integrated Intelligence and Communication Systems (ICIICS). IEEE, 2024. https://doi.org/10.1109/iciics63763.2024.10860057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ho, Shuyuan Mary, Hengyi Fu, Shashanka S. Timmarajus, Cheryl Booth, Jung Hoon Baeg, and Muye Liu. "Insider Threat." In SIGMIS-CPR '15: 2015 Computers and People Research Conference. ACM, 2015. http://dx.doi.org/10.1145/2751957.2751978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Williams, Adam, Colton Heffington, Shannon Abbott, et al. "Operationalizing Insider Threat Potential and Risk-Significant Insiders to Enhance Insider Threat Detection and Mitigation." In Annual Meeting - Vienna, , Austria - May - 2023. US DOE, 2023. http://dx.doi.org/10.2172/2431208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bishop, Matt, Kara Nance, and Jason Clark. "Introduction to Inside the Insider Threat Minitrack." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2017. http://dx.doi.org/10.24251/hicss.2017.318.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Insider threat"

1

CALIFORNIA UNIV LOS ANGELES. DoD Insider Threat Mitigation. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada385423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Montelibano, Joji, and Andrew Moore. Insider Threat Security Reference Architecture. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada609926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wong, F. Insider Threat Symposium Curated Questions. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1548366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Maxion, R. A., K. M. Tan, S. S. Killourhy, and T. N. Townsend. Profiler-2000: Attacking the Insider Threat. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada439600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gibbs, Philip, Robert Larsen, Mike O'Brien, and Jose Rodriquez. Insider Threat Mitigation Workshop Instructional Materials. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/1170579.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shevenell, Michael John. A Scalable HPC Insider Threat Monitoring System. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1489161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gibbs, Philip, Robert Larsen, Mike O'Brien, and Tom Edmunds. Advanced Insider Threat Mitigation Workshop Instructional Materials. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/1167146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gibbs, Philip, Robert Larsen, Mike O Brien, and Tom Edmunds. Advanced insider threat mitigation workshop instructional materials. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/1167421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hanley, Michael, and Joji Montelibano. Insider Threat Control: Using Centralized Logging to Detect Data Exfiltration Near Insider Termination. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada610463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pope, Noah Gale, Martha Williams, Joel Lewis, and Thomas Pham. Taking Steps to Protect Against the Insider Threat. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1223757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!