Academic literature on the topic 'Insider threats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Insider threats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Insider threats"
Mohammad, Nur Ameera Natasha, Warusia Mohamed Yassin, Rabiah Ahmad, Aslinda Hassan, and Mohammed Nasser Ahmed Al Mhiqani. "An Insider Threat Categorization Framework for Automated Manufacturing Execution System." International Journal of Innovation in Enterprise System 3, no. 02 (2019): 31–41. http://dx.doi.org/10.25124/ijies.v3i02.38.
Full textHu, Teng, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, and Xiaosong Zhang. "Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats." Sensors 20, no. 18 (2020): 5297. http://dx.doi.org/10.3390/s20185297.
Full textAl-Mhiqani, Mohammed Nasser, Rabiah Ahmad, Z. Zainal Abidin, et al. "A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations." Applied Sciences 10, no. 15 (2020): 5208. http://dx.doi.org/10.3390/app10155208.
Full textPalaparthy, Keerthana, Y. Manohar Reddy, Jatoth Victor Paul, and S. Raju. "Enhancing Insider Threat Detection through Integrated Behavioral, Signature and Anomaly based Detection Methods." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem39835.
Full textKim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. http://dx.doi.org/10.3390/app9194018.
Full textSoleh, Musdi Muhammad. "A Study Case in NTMC POLRI: Reducing Data Breach Risk from Insider Threats by Using Risk IT Framework." ACMIT Proceedings 3, no. 1 (2019): 171–79. http://dx.doi.org/10.33555/acmit.v3i1.41.
Full textAlsowail, Rakan A., and Taher Al-Shehari. "A Multi-Tiered Framework for Insider Threat Prevention." Electronics 10, no. 9 (2021): 1005. http://dx.doi.org/10.3390/electronics10091005.
Full textHobbs, Christopher. "Insider threats." International Affairs 95, no. 3 (2019): 725–26. http://dx.doi.org/10.1093/ia/iiz084.
Full textNiblett, Gareth. "Insider Threats." ITNOW 58, no. 2 (2016): 23. http://dx.doi.org/10.1093/itnow/bww039.
Full textLuqman Hakim. "Insider Threats: The Cybersecurity Analysis using OCTAVE Allegro which are combined with HAIS-Q." Uranus : Jurnal Ilmiah Teknik Elektro, Sains dan Informatika 3, no. 1 (2025): 36–47. https://doi.org/10.61132/uranus.v3i1.649.
Full textDissertations / Theses on the topic "Insider threats"
Hartline, Cecil L. Jr. "Examination of Insider Threats| A Growing Concern." Thesis, Utica College, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10687276.
Full textJenkins, Jeffrey Lyne. "Alleviating Insider Threats: Mitigation Strategies and Detection Techniques." Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/297023.
Full textAlawneh, Muntaha. "Mitigating the risk of insider threats when sharing credentials." Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/aa8e8463-ae05-06f2-ddd9-cc4756a61c86/10/.
Full textDenison, Stephen. "The accessibility of insider threats on a corporate network." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1604807.
Full textElmrabit, Nebrase. "A multiple-perspective approach for insider-threat risk prediction in cyber-security." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/36243.
Full textCatrantzos, Nicholas. "No dark corners defending against insider threats to critical infrastructure /." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FCatrantzos.pdf.
Full textLombardo, Gary. "Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats." Thesis, Capella University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10751570.
Full textClarke, Karla A. "Novel Alert Visualization: The Development of a Visual Analytics Prototype for Mitigation of Malicious Insider Cyber Threats." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1049.
Full textAlmajed, Yasser M. "A framework for an adaptive early warning and response system for insider privacy breaches." Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/11129.
Full textMunshi, Asmaa Mahdi. "A study of insider threat behaviour: developing a holistic insider threat model." Thesis, Curtin University, 2013. http://hdl.handle.net/20.500.11937/1668.
Full textBooks on the topic "Insider threats"
Arduin, Pierre-Emmanuel. Insider Threats. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119419785.
Full textBertino, Elisa. Data Protection from Insider Threats. Springer International Publishing, 2012. http://dx.doi.org/10.1007/978-3-031-01890-9.
Full textProbst, Christian W., Jeffrey Hunker, Dieter Gollmann, and Matt Bishop, eds. Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.
Full textContos, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures. Elsevier, 2009.
Find full textAndrew, Moore, and Trzeciak Randall, eds. The CERT guide to insider threats: How to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud). Addison-Wesley, 2012.
Find full textElam, Jason. Inside threat: A Riley Covington thriller. Tyndale House Publishers, 2011.
Find full textGodse, Vinayak. The threat within: A study on insider threat by DSCI in collaboration with PwC. Data Security Council of India, 2011.
Find full text1954-, Hoffman Bruce, United States. Dept. of Energy., and Rand Corporation, eds. Insider crime: The threat to nuclear facilities and programs. Rand Corp., 1990.
Find full textBook chapters on the topic "Insider threats"
Haber, Morey J., and Brad Hibbert. "Insider Threats." In Privileged Attack Vectors. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3048-0_6.
Full textFennelly, Lawrence J., and Marianna A. Perry. "Insider Threats." In Security Officers and Supervisors. CRC Press, 2024. http://dx.doi.org/10.4324/9781003402718-124.
Full textEdwards, Dr Jason. "Insider Threats." In Mastering Cybersecurity. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0297-3_14.
Full textCatrantzos, Nick. "Anomalous Insider Threats." In Managing the Insider Threat, 2nd ed. CRC Press, 2022. http://dx.doi.org/10.4324/9781003292678-12.
Full textCatrantzos, Nick. "Mortal Insider Threats." In Managing the Insider Threat, 2nd ed. CRC Press, 2022. http://dx.doi.org/10.4324/9781003292678-10.
Full textNeumann, Peter G. "Combatting Insider Threats." In Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3_2.
Full textHaber, Morey J. "Insider and External Threats." In Privileged Attack Vectors. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5914-6_7.
Full textClaycomb, William R., and John McCloud. "Protection from Insider Threats." In Encyclopedia of Database Systems. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_80602-1.
Full textProbst, Christian W., Jeffrey Hunker, Dieter Gollmann, and Matt Bishop. "Aspects of Insider Threats." In Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3_1.
Full textClaycomb, William R., and John McCloud. "Protection from Insider Threats." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_80602.
Full textConference papers on the topic "Insider threats"
S P, Manikandan, K. Ashok Kumar, T. Sai Harsha Vardhan, G. Thanigaivel, B. Venkataramanaiah, and Vijaya Vardan Reddy S P. "Detecting Insider Threats in Cybersecurity Using Machine Learning." In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS). IEEE, 2024. https://doi.org/10.1109/icicnis64247.2024.10823353.
Full textZewdie, Marshet, Anteneh Girma, and Tilahun Melak Sitote. "Deep Neural Networks for Detecting Insider Threats and Social Engineering Attacks." In 2024 International Conference on Electrical, Computer and Energy Technologies (ICECET). IEEE, 2024. http://dx.doi.org/10.1109/icecet61485.2024.10698519.
Full textAdeniyi, Abidemi Emmanuel, Mercy Oka Ebute, Halleluyah Oluwatobi Aworinde, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, and Oluwaferanmi Adedamola Adewusi. "Development of Cryptographic Algorithms for Protecting Cloud Data from Insider Threats." In 2024 IEEE 5th International Conference on Electro-Computing Technologies for Humanity (NIGERCON). IEEE, 2024. https://doi.org/10.1109/nigercon62786.2024.10927213.
Full textMcGough, Andrew Stephen, David Wall, John Brennan, et al. "Insider Threats." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. ACM, 2015. http://dx.doi.org/10.1145/2808783.2808785.
Full textGreitzer, Frank L. "Insider Threats." In NCS '19: Northwest Cybersecurity Symposium. ACM, 2019. http://dx.doi.org/10.1145/3332448.3332458.
Full textClaycomb, William R. "Detecting Insider Threats." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. ACM, 2015. http://dx.doi.org/10.1145/2808783.2808794.
Full textHaim, Bar, Eitan Menahem, Yaron Wolfsthal, and Christopher Meenan. "Visualizing Insider Threats." In IUI'17: 22nd International Conference on Intelligent User Interfaces. ACM, 2017. http://dx.doi.org/10.1145/3030024.3038264.
Full textClaycomb, William R., Carly L. Huth, Brittany Phillips, Lori Flynn, and David McIntire. "Identifying indicators of insider threats: Insider IT sabotage." In 2013 International Carnahan Conference on Security Technology (ICCST). IEEE, 2013. http://dx.doi.org/10.1109/ccst.2013.6922038.
Full textStamati-Koromina, Veroniki, Christos Ilioudis, Richard Overill, Christos K. Georgiadis, and Demosthenes Stamatis. "Insider threats in corporate environments." In the Fifth Balkan Conference in Informatics. ACM Press, 2012. http://dx.doi.org/10.1145/2371316.2371374.
Full text"Modelling of Enterprise Insider Threats." In 1st International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005327901320136.
Full textReports on the topic "Insider threats"
Hallahan, Jason. Countering Insider Threats - Handling Insider Threats Using Dynamic, Run-Time Forensics. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada473440.
Full textReiher, Peter. File Profiling for Insider Threats. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada405498.
Full textSantos, Jr, and Eugene. On Insider Threats, Deception, and User Modeling. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada567009.
Full textSilowash, George, Dawn Cappelli, Andrew Moore, Randall Trzeciak, Timothy J. Shimeall, and Lori Flynn. Common Sense Guide to Mitigating Insider Threats 4th Edition. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada585500.
Full textGreitzer, Frank L., Lars J. Kangas, Christine F. Noonan, and Angela C. Dalton. Identifying at-risk employees: A behavioral model for predicting potential insider threats. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/1000159.
Full textKelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Full textCALIFORNIA UNIV LOS ANGELES. DoD Insider Threat Mitigation. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada385423.
Full textMontelibano, Joji, and Andrew Moore. Insider Threat Security Reference Architecture. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada609926.
Full textWong, F. Insider Threat Symposium Curated Questions. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1548366.
Full textMaxion, R. A., K. M. Tan, S. S. Killourhy, and T. N. Townsend. Profiler-2000: Attacking the Insider Threat. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada439600.
Full text