Journal articles on the topic 'Insider threat'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Insider threat.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alsowail, Rakan A., and Taher Al-Shehari. "A Multi-Tiered Framework for Insider Threat Prevention." Electronics 10, no. 9 (2021): 1005. http://dx.doi.org/10.3390/electronics10091005.
Full textMohammad, Nur Ameera Natasha, Warusia Mohamed Yassin, Rabiah Ahmad, Aslinda Hassan, and Mohammed Nasser Ahmed Al Mhiqani. "An Insider Threat Categorization Framework for Automated Manufacturing Execution System." International Journal of Innovation in Enterprise System 3, no. 02 (2019): 31–41. http://dx.doi.org/10.25124/ijies.v3i02.38.
Full textPalaparthy, Keerthana, Y. Manohar Reddy, Jatoth Victor Paul, and S. Raju. "Enhancing Insider Threat Detection through Integrated Behavioral, Signature and Anomaly based Detection Methods." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem39835.
Full textAnatoly, Adamovich Kornienko, and Aleksandrovich Polyanichko Mark. "Insider Detection Method in a Company." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 2 (2019): 585–92. https://doi.org/10.35940/ijeat.A1452.129219.
Full textMohammed, Nasser Al-Mhiqani, Ahmad Rabiah, Zainal Abidin Zaheera, Yassin Warusia, Hassan Aslinda, and Natasha Mohammad Ameera. "New insider threat detection method based on recurrent neural networks." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 17, no. 3 (2020): 1474–79. https://doi.org/10.11591/ijeecs.v17.i3.pp1474-1479.
Full textAl-Mhiqani, Mohammed Nasser, Rabiah Ahmad, Z. Zainal Abidin, et al. "A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations." Applied Sciences 10, no. 15 (2020): 5208. http://dx.doi.org/10.3390/app10155208.
Full textNasser Al-mhiqani, Mohammed, Rabiah Ahmad, Zaheera Zainal Abidin, Warusia Yassin, Aslinda Hassan, and Ameera Natasha Mohammad. "New insider threat detection method based on recurrent neural networks." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (2020): 1474. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1474-1479.
Full textLuqman Hakim. "Insider Threats: The Cybersecurity Analysis using OCTAVE Allegro which are combined with HAIS-Q." Uranus : Jurnal Ilmiah Teknik Elektro, Sains dan Informatika 3, no. 1 (2025): 36–47. https://doi.org/10.61132/uranus.v3i1.649.
Full textAdikari, Swini. "Countering the Threat of Nuclear Terrorism Arising from Malicious Insiders." Global Affairs Review 1, no. 2 (2021): 1–18. http://dx.doi.org/10.51330/gar.0020214.
Full textKim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. http://dx.doi.org/10.3390/app9194018.
Full textSoleh, Musdi Muhammad. "A Study Case in NTMC POLRI: Reducing Data Breach Risk from Insider Threats by Using Risk IT Framework." ACMIT Proceedings 3, no. 1 (2019): 171–79. http://dx.doi.org/10.33555/acmit.v3i1.41.
Full textKim, Jung Hwan, Chul Min Kim, and Man-Sung Yim. "An Investigation of Insider Threat Mitigation Based on EEG Signal Classification." Sensors 20, no. 21 (2020): 6365. http://dx.doi.org/10.3390/s20216365.
Full textYilmaz, Erhan, and Ozgu Can. "Unveiling Shadows: Harnessing Artificial Intelligence for Insider Threat Detection." Engineering, Technology & Applied Science Research 14, no. 2 (2024): 13341–46. http://dx.doi.org/10.48084/etasr.6911.
Full textHershkowitz, Martin. "The “Insider” Threat." Journal of Police Crisis Negotiations 7, no. 1 (2007): 103–11. http://dx.doi.org/10.1300/j173v07n01_06.
Full textNostro, Nicola, Andrea Ceccarelli, Andrea Bondavalli, and Francesco Brancati. "Insider Threat Assessment." ACM SIGOPS Operating Systems Review 48, no. 2 (2014): 3–12. http://dx.doi.org/10.1145/2694737.2694740.
Full textSaxena, Neetesh, Emma Hayes, Elisa Bertino, Patrick Ojo, Kim-Kwang Raymond Choo, and Pete Burnap. "Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses." Electronics 9, no. 9 (2020): 1460. http://dx.doi.org/10.3390/electronics9091460.
Full textHu, Teng, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, and Xiaosong Zhang. "Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats." Sensors 20, no. 18 (2020): 5297. http://dx.doi.org/10.3390/s20185297.
Full textJason Slaughter, Carole E. Chaski, and Kellep Charles. "Emotion analysis based on belief of targeted individual supporting insider threat detection." International Journal of Science and Research Archive 11, no. 2 (2024): 226–37. http://dx.doi.org/10.30574/ijsra.2024.11.2.0393.
Full textBhandari, Durga, and Kumar Pudashine. "Insider Threat Detection using LSTM." Journal of Science and Technology 3, no. 1 (2023): 57–65. http://dx.doi.org/10.3126/jost.v3i1.69066.
Full textWang, Jiarong, Qianran Sun, and Caiqiu Zhou. "Insider Threat Detection Based on Deep Clustering of Multi-Source Behavioral Events." Applied Sciences 13, no. 24 (2023): 13021. http://dx.doi.org/10.3390/app132413021.
Full textMarshet Tamirat. "Current Detection Methods for Insider Threats and Social Engineering Attacks: Enhancements and Analysis Using Deep Learning." Journal of Electrical Systems 20, no. 11s (2024): 2838–53. https://doi.org/10.52783/jes.7966.
Full textAl-Shehari, Taher, and Rakan A. Alsowail. "An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques." Entropy 23, no. 10 (2021): 1258. http://dx.doi.org/10.3390/e23101258.
Full textClarke, Karla, Yair Levy, Laurie Dringus, and Shonda Brown. "How workplace satisfaction affects insider threat detection as a vital variable for the mitigation of malicious cyber insiders." Online Journal of Applied Knowledge Management 7, no. 1 (2019): 40–52. http://dx.doi.org/10.36965/ojakm.2019.7(1)40-52.
Full textDr.Vijayalakshmi Chintamaneni, Dr.M.SreeRamu, and Shaik Abubakar Siddiq. "Insider Threats in the Age of Cyber Threat Intelligence: Behavioral Indicators and Detection Strategies." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 132–43. https://doi.org/10.46647/ijetms.2025.v09si01.022.
Full textZhu, Taiming, Yuanbo Guo, Ankang Ju, Jun Ma, and Xuan Wang. "An Insider Threat Detection Method Based on Business Process Mining." International Journal of Business Data Communications and Networking 13, no. 2 (2017): 83–98. http://dx.doi.org/10.4018/ijbdcn.2017070107.
Full textQin, Heng, and Jin Hui Zhao. "Insider Threat Detection with Behavior-Based Attestation." Applied Mechanics and Materials 568-570 (June 2014): 1370–75. http://dx.doi.org/10.4028/www.scientific.net/amm.568-570.1370.
Full textFyffe, George. "Addressing the insider threat." Network Security 2008, no. 3 (2008): 11–14. http://dx.doi.org/10.1016/s1353-4858(08)70031-x.
Full textPfleeger, Shari Lawrence, and Salvatore J. Stolfo. "Addressing the Insider Threat." IEEE Security & Privacy Magazine 7, no. 6 (2009): 10–13. http://dx.doi.org/10.1109/msp.2009.146.
Full textWATANABE, Kazumi. "Insider cyber-threat study:." Proceedings of the Annual Convention of the Japanese Psychological Association 74 (September 20, 2010): 3PM145. http://dx.doi.org/10.4992/pacjpa.74.0_3pm145.
Full textSREEKUMAR, SHREYA, SARANG C, ALKA SAJEEVAN P, VARNA O V, and ASWATHI V. "Insider Threat Detection Methodologies." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43389.
Full textShevchenko, Svitlana, Yuliia Zhdanovа, Pavlo Skladannyi, and Sofia Boiko. "INSIDERS AND INSIDER INFORMATION: ESSENCE, THREATS, ACTIVITIES AND LEGAL RESPONSIBILITY." Cybersecurity: Education, Science, Technique 3, no. 15 (2022): 175–85. http://dx.doi.org/10.28925/2663-4023.2022.15.175185.
Full textRuba, Ruba, and Hanan AlShaher. "Insider Threat Detection: Exploring User Event Behavior Analytics and Machine Learning in Security Reviews." Journal of Cybersecurity and Information Management 13, no. 2 (2024): 171–81. http://dx.doi.org/10.54216/jcim.130213.
Full textMunro, Victor. "Applying Insider Risk Mitigation: Contemporary Issues." Journal of Intelligence, Conflict, and Warfare 6, no. 2 (2023): 84–89. http://dx.doi.org/10.21810/jicw.v6i2.6251.
Full textZatonatskiy, D., V. Marhasova, and N. Korogod. "INSIDER THREAT MANAGEMENT AS AN ELEMENT OF THE CORPORATE ECONOMIC SECURITY." Financial and credit activity: problems of theory and practice 1, no. 36 (2021): 149–58. http://dx.doi.org/10.18371/fcaptp.v1i36.227690.
Full textBurrell, Darrell Norman, Calvin Nobles, Austin Cusak, Marwan Omar, and Lemie Gillesania. "CYBERCRIME AND THE NATURE OF INSIDER THREAT COMPLEXITIES IN HEALTHCARE AND BIOTECHNOLOGY ENGINEERING ORGANIZATIONS." JOURNAL OF CRIME AND CRIMINAL BEHAVIOR 2, no. 2 (2022): 131–44. http://dx.doi.org/10.47509/jccb.2022.v02i02.04.
Full textResearcher. "THE ROLE OF AI IN DETECTING INSIDER THREATS IN HEALTHCARE ORGANIZATIONS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 239–48. https://doi.org/10.5281/zenodo.13960643.
Full textTrivedi, Aayush. "Research Paper on Cybersecurity and Insider Threat Detection: The Role of User Behavior Analytics (UBA) in Modern Defense Strategies." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 455–66. https://doi.org/10.22214/ijraset.2025.66298.
Full textAlsowail, Rakan A., and Taher Al-Shehari. "Techniques and countermeasures for preventing insider threats." PeerJ Computer Science 8 (April 1, 2022): e938. http://dx.doi.org/10.7717/peerj-cs.938.
Full textOgunbodede, Olajide O., Olumide S. Adewale, Boniface K. Alese, and Oluyomi K. Akinyokun. "Game Theory for Insider Threat Detection and Mitigation: A Review." International Journal of Advances in Engineering and Management 6, no. 10 (2024): 104–13. https://doi.org/10.35629/5252-0610104113.
Full textDonald, L. Buresh Ph.D. J.D. LL.M. "Can Extremism Be Thought of As an Insider Threat?" International Journal of Social Science and Human Research 04, no. 10 (2021): 2650–57. https://doi.org/10.47191/ijsshr/v4-i10-04.
Full textSingh Lodhi, Manvendra, and Rahul Kaul. "Detecting Unknown Insider Threat Scenarios." International Journal on Computational Science & Applications 6, no. 5/6 (2016): 15–21. http://dx.doi.org/10.5121/ijcsa.2016.6602.
Full textMcKenna, Brian. "Danger of the insider threat." Infosecurity 4, no. 2 (2007): 5. http://dx.doi.org/10.1016/s1754-4548(07)70025-6.
Full textBulpett, Ben. "Safeguarding against the insider threat." Network Security 2020, no. 6 (2020): 14–17. http://dx.doi.org/10.1016/s1353-4858(20)30068-4.
Full textGreitzer, Frank L., Andrew P. Moore, Dawn M. Cappelli, Dee H. Andrews, Lynn A. Carroll, and Thomas D. Hull. "Combating the Insider Cyber Threat." IEEE Security & Privacy Magazine 6, no. 1 (2008): 61–64. http://dx.doi.org/10.1109/msp.2008.8.
Full textArchuleta, Edmund G., and Jack Moyer. "Guarding Against the Insider Threat." Journal - American Water Works Association 101, no. 5 (2009): 38–44. http://dx.doi.org/10.1002/j.1551-8833.2009.tb09891.x.
Full textGaiduk, K. A., and A. Y. Iskhakov. "Using machine learning techniques for insider threat detection." Herald of the Siberian State University of Telecommunications and Informatics 16, no. 4 (2022): 80–95. http://dx.doi.org/10.55648/1998-6920-2022-16-4-80-95.
Full textNicolaou, Andreas, Stavros Shiaeles, and Nick Savage. "Mitigating Insider Threats Using Bio-Inspired Models." Applied Sciences 10, no. 15 (2020): 5046. http://dx.doi.org/10.3390/app10155046.
Full textGayathri, R. G., Atul Sajjanhar, and Yong Xiang. "Image-Based Feature Representation for Insider Threat Classification." Applied Sciences 10, no. 14 (2020): 4945. http://dx.doi.org/10.3390/app10144945.
Full textEwuola, Ayomipo. "Risk-Based Approach to Corporate Investigations and Insider Threat Mitigation in Multinational Organizations." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 2 (2023): 811–21. https://doi.org/10.54660/.ijmrge.2023.4.2.811-821.
Full textItai, Yaya, and Emmanuel Onwubiko. "Combating insider fraud in Financial Institutions/impact." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 14 (January 17, 2019): 3351–58. http://dx.doi.org/10.24297/ijmit.v14i0.8010.
Full text