Journal articles on the topic 'Insider threat'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Insider threat.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alsowail, Rakan A., and Taher Al-Shehari. "A Multi-Tiered Framework for Insider Threat Prevention." Electronics 10, no. 9 (April 22, 2021): 1005. http://dx.doi.org/10.3390/electronics10091005.
Full textMohammad, Nur Ameera Natasha, Warusia Mohamed Yassin, Rabiah Ahmad, Aslinda Hassan, and Mohammed Nasser Ahmed Al Mhiqani. "An Insider Threat Categorization Framework for Automated Manufacturing Execution System." International Journal of Innovation in Enterprise System 3, no. 02 (July 31, 2019): 31–41. http://dx.doi.org/10.25124/ijies.v3i02.38.
Full textHu, Teng, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, and Xiaosong Zhang. "Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats." Sensors 20, no. 18 (September 16, 2020): 5297. http://dx.doi.org/10.3390/s20185297.
Full textAl-Mhiqani, Mohammed Nasser, Rabiah Ahmad, Z. Zainal Abidin, Warusia Yassin, Aslinda Hassan, Karrar Hameed Abdulkareem, Nabeel Salih Ali, and Zahri Yunos. "A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations." Applied Sciences 10, no. 15 (July 28, 2020): 5208. http://dx.doi.org/10.3390/app10155208.
Full textNasser Al-mhiqani, Mohammed, Rabiah Ahmad, Zaheera Zainal Abidin, Warusia Yassin, Aslinda Hassan, and Ameera Natasha Mohammad. "New insider threat detection method based on recurrent neural networks." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (March 1, 2020): 1474. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1474-1479.
Full textAdikari, Swini. "Countering the Threat of Nuclear Terrorism Arising from Malicious Insiders." Global Affairs Review 1, no. 2 (June 15, 2021): 1–18. http://dx.doi.org/10.51330/gar.0020214.
Full textKim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (September 25, 2019): 4018. http://dx.doi.org/10.3390/app9194018.
Full textSoleh, Musdi Muhammad. "A Study Case in NTMC POLRI: Reducing Data Breach Risk from Insider Threats by Using Risk IT Framework." ACMIT Proceedings 3, no. 1 (March 18, 2019): 171–79. http://dx.doi.org/10.33555/acmit.v3i1.41.
Full textYilmaz, Erhan, and Ozgu Can. "Unveiling Shadows: Harnessing Artificial Intelligence for Insider Threat Detection." Engineering, Technology & Applied Science Research 14, no. 2 (April 2, 2024): 13341–46. http://dx.doi.org/10.48084/etasr.6911.
Full textKim, Jung Hwan, Chul Min Kim, and Man-Sung Yim. "An Investigation of Insider Threat Mitigation Based on EEG Signal Classification." Sensors 20, no. 21 (November 8, 2020): 6365. http://dx.doi.org/10.3390/s20216365.
Full textHershkowitz, Martin. "The “Insider” Threat." Journal of Police Crisis Negotiations 7, no. 1 (March 6, 2007): 103–11. http://dx.doi.org/10.1300/j173v07n01_06.
Full textNostro, Nicola, Andrea Ceccarelli, Andrea Bondavalli, and Francesco Brancati. "Insider Threat Assessment." ACM SIGOPS Operating Systems Review 48, no. 2 (December 5, 2014): 3–12. http://dx.doi.org/10.1145/2694737.2694740.
Full textSaxena, Neetesh, Emma Hayes, Elisa Bertino, Patrick Ojo, Kim-Kwang Raymond Choo, and Pete Burnap. "Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses." Electronics 9, no. 9 (September 7, 2020): 1460. http://dx.doi.org/10.3390/electronics9091460.
Full textJason Slaughter, Carole E. Chaski, and Kellep Charles. "Emotion analysis based on belief of targeted individual supporting insider threat detection." International Journal of Science and Research Archive 11, no. 2 (March 30, 2024): 226–37. http://dx.doi.org/10.30574/ijsra.2024.11.2.0393.
Full textWang, Jiarong, Qianran Sun, and Caiqiu Zhou. "Insider Threat Detection Based on Deep Clustering of Multi-Source Behavioral Events." Applied Sciences 13, no. 24 (December 6, 2023): 13021. http://dx.doi.org/10.3390/app132413021.
Full textAl-Shehari, Taher, and Rakan A. Alsowail. "An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques." Entropy 23, no. 10 (September 27, 2021): 1258. http://dx.doi.org/10.3390/e23101258.
Full textClarke, Karla, Yair Levy, Laurie Dringus, and Shonda Brown. "How workplace satisfaction affects insider threat detection as a vital variable for the mitigation of malicious cyber insiders." Online Journal of Applied Knowledge Management 7, no. 1 (May 22, 2019): 40–52. http://dx.doi.org/10.36965/ojakm.2019.7(1)40-52.
Full textZhu, Taiming, Yuanbo Guo, Ankang Ju, Jun Ma, and Xuan Wang. "An Insider Threat Detection Method Based on Business Process Mining." International Journal of Business Data Communications and Networking 13, no. 2 (July 2017): 83–98. http://dx.doi.org/10.4018/ijbdcn.2017070107.
Full textQin, Heng, and Jin Hui Zhao. "Insider Threat Detection with Behavior-Based Attestation." Applied Mechanics and Materials 568-570 (June 2014): 1370–75. http://dx.doi.org/10.4028/www.scientific.net/amm.568-570.1370.
Full textFyffe, George. "Addressing the insider threat." Network Security 2008, no. 3 (March 2008): 11–14. http://dx.doi.org/10.1016/s1353-4858(08)70031-x.
Full textPfleeger, Shari Lawrence, and Salvatore J. Stolfo. "Addressing the Insider Threat." IEEE Security & Privacy Magazine 7, no. 6 (November 2009): 10–13. http://dx.doi.org/10.1109/msp.2009.146.
Full textWATANABE, Kazumi. "Insider cyber-threat study:." Proceedings of the Annual Convention of the Japanese Psychological Association 74 (September 20, 2010): 3PM145. http://dx.doi.org/10.4992/pacjpa.74.0_3pm145.
Full textRuba, Ruba, and Hanan AlShaher. "Insider Threat Detection: Exploring User Event Behavior Analytics and Machine Learning in Security Reviews." Journal of Cybersecurity and Information Management 13, no. 2 (2024): 171–81. http://dx.doi.org/10.54216/jcim.130213.
Full textMunro, Victor. "Applying Insider Risk Mitigation: Contemporary Issues." Journal of Intelligence, Conflict, and Warfare 6, no. 2 (November 24, 2023): 84–89. http://dx.doi.org/10.21810/jicw.v6i2.6251.
Full textShevchenko, Svitlana, Yuliia Zhdanovа, Pavlo Skladannyi, and Sofia Boiko. "INSIDERS AND INSIDER INFORMATION: ESSENCE, THREATS, ACTIVITIES AND LEGAL RESPONSIBILITY." Cybersecurity: Education, Science, Technique 3, no. 15 (2022): 175–85. http://dx.doi.org/10.28925/2663-4023.2022.15.175185.
Full textZatonatskiy, D., V. Marhasova, and N. Korogod. "INSIDER THREAT MANAGEMENT AS AN ELEMENT OF THE CORPORATE ECONOMIC SECURITY." Financial and credit activity: problems of theory and practice 1, no. 36 (February 17, 2021): 149–58. http://dx.doi.org/10.18371/fcaptp.v1i36.227690.
Full textBurrell, Darrell Norman, Calvin Nobles, Austin Cusak, Marwan Omar, and Lemie Gillesania. "CYBERCRIME AND THE NATURE OF INSIDER THREAT COMPLEXITIES IN HEALTHCARE AND BIOTECHNOLOGY ENGINEERING ORGANIZATIONS." JOURNAL OF CRIME AND CRIMINAL BEHAVIOR 2, no. 2 (2022): 131–44. http://dx.doi.org/10.47509/jccb.2022.v02i02.04.
Full textZeng, Min, Chuanzhou Dian, and Yaoyao Wei. "Risk Assessment of Insider Threats Based on IHFACS-BN." Sustainability 15, no. 1 (December 28, 2022): 491. http://dx.doi.org/10.3390/su15010491.
Full textAlsowail, Rakan A., and Taher Al-Shehari. "Techniques and countermeasures for preventing insider threats." PeerJ Computer Science 8 (April 1, 2022): e938. http://dx.doi.org/10.7717/peerj-cs.938.
Full textSingh Lodhi, Manvendra, and Rahul Kaul. "Detecting Unknown Insider Threat Scenarios." International Journal on Computational Science & Applications 6, no. 5/6 (December 31, 2016): 15–21. http://dx.doi.org/10.5121/ijcsa.2016.6602.
Full textMcKenna, Brian. "Danger of the insider threat." Infosecurity 4, no. 2 (March 2007): 5. http://dx.doi.org/10.1016/s1754-4548(07)70025-6.
Full textBulpett, Ben. "Safeguarding against the insider threat." Network Security 2020, no. 6 (June 2020): 14–17. http://dx.doi.org/10.1016/s1353-4858(20)30068-4.
Full textGreitzer, Frank L., Andrew P. Moore, Dawn M. Cappelli, Dee H. Andrews, Lynn A. Carroll, and Thomas D. Hull. "Combating the Insider Cyber Threat." IEEE Security & Privacy Magazine 6, no. 1 (2008): 61–64. http://dx.doi.org/10.1109/msp.2008.8.
Full textArchuleta, Edmund G., and Jack Moyer. "Guarding Against the Insider Threat." Journal - American Water Works Association 101, no. 5 (May 2009): 38–44. http://dx.doi.org/10.1002/j.1551-8833.2009.tb09891.x.
Full textNicolaou, Andreas, Stavros Shiaeles, and Nick Savage. "Mitigating Insider Threats Using Bio-Inspired Models." Applied Sciences 10, no. 15 (July 22, 2020): 5046. http://dx.doi.org/10.3390/app10155046.
Full textGaiduk, K. A., and A. Y. Iskhakov. "Using machine learning techniques for insider threat detection." Herald of the Siberian State University of Telecommunications and Informatics 16, no. 4 (December 4, 2022): 80–95. http://dx.doi.org/10.55648/1998-6920-2022-16-4-80-95.
Full textGayathri, R. G., Atul Sajjanhar, and Yong Xiang. "Image-Based Feature Representation for Insider Threat Classification." Applied Sciences 10, no. 14 (July 18, 2020): 4945. http://dx.doi.org/10.3390/app10144945.
Full textItai, Yaya, and Emmanuel Onwubiko. "Combating insider fraud in Financial Institutions/impact." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 14 (January 17, 2019): 3351–58. http://dx.doi.org/10.24297/ijmit.v14i0.8010.
Full textFranqueira, Virginia N. L., André van Cleeff, Pascal van Eck, and Roel J. Wieringa. "Engineering Security Agreements Against External Insider Threat." Information Resources Management Journal 26, no. 4 (October 2013): 66–91. http://dx.doi.org/10.4018/irmj.2013100104.
Full textPark, Won, Youngin You, and Kyungho Lee. "Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media." Security and Communication Networks 2018 (July 18, 2018): 1–8. http://dx.doi.org/10.1155/2018/7243296.
Full textPARVEEN, PALLABI, NATHAN MCDANIEL, ZACKARY WEGER, JONATHAN EVANS, BHAVANI THURAISINGHAM, KEVIN HAMLEN, and LATIFUR KHAN. "EVOLVING INSIDER THREAT DETECTION STREAM MINING PERSPECTIVE." International Journal on Artificial Intelligence Tools 22, no. 05 (October 2013): 1360013. http://dx.doi.org/10.1142/s0218213013600130.
Full textIdris, Ismaila, and Adeleke Nafisa Damilola. "Systematic Literature Review and Metadata Analysis of Insider Threat Detection Mechanism." International Journal of Computer Science and Mobile Computing 12, no. 4 (April 30, 2023): 60–88. http://dx.doi.org/10.47760/ijcsmc.2023.v12i04.007.
Full textAbu Bakar, Rahimah, Bahbibi Rahmatullah, Erni Munastiwi, and Omar Dheyab. "A confirmatory analysis of the prevention insider threat in organization information system." Journal of Technology and Humanities 2, no. 1 (May 19, 2021): 20–30. http://dx.doi.org/10.53797/jthkkss.v2i1.3.2021.
Full textKumarMandal, Kunal, and Debayan Chatterjee. "Insider Threat Mitigation in Cloud Computing." International Journal of Computer Applications 120, no. 20 (June 18, 2015): 7–11. http://dx.doi.org/10.5120/21341-4352.
Full textSteele, Sean, and Chris Wargo. "An Introduction to Insider Threat Management." Information Systems Security 16, no. 1 (March 28, 2007): 23–33. http://dx.doi.org/10.1080/10658980601051334.
Full textSantos, Eugene, Hien Nguyen, Fei Yu, Keum Joo Kim, Deqing Li, John T. Wilkinson, Adam Olson, Jacob Russell, and Brittany Clark. "Intelligence Analyses and the Insider Threat." IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 42, no. 2 (March 2012): 331–47. http://dx.doi.org/10.1109/tsmca.2011.2162500.
Full textOladimeji, T. O., C. K. Ayo, and S. E. Adewumi. "Review on Insider Threat Detection Techniques." Journal of Physics: Conference Series 1299 (August 2019): 012046. http://dx.doi.org/10.1088/1742-6596/1299/1/012046.
Full textGaldies, Peter. "The insider threat to data assets." Journal of Direct, Data and Digital Marketing Practice 15, no. 3 (January 2014): 197–200. http://dx.doi.org/10.1057/dddmp.2014.2.
Full textWalton, Richard, and Walton-Mackenzie Limited. "Balancing the insider and outsider threat." Computer Fraud & Security 2006, no. 11 (November 2006): 8–11. http://dx.doi.org/10.1016/s1361-3723(06)70440-7.
Full textBunyitai, Ákos. "Insider Threat Mitigation in High Security Facilities." Nemzetbiztonsági Szemle 11, no. 1 (May 16, 2023): 49–61. http://dx.doi.org/10.32561/nsz.2023.1.4.
Full text