Journal articles on the topic 'Insider threats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Insider threats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mohammad, Nur Ameera Natasha, Warusia Mohamed Yassin, Rabiah Ahmad, Aslinda Hassan, and Mohammed Nasser Ahmed Al Mhiqani. "An Insider Threat Categorization Framework for Automated Manufacturing Execution System." International Journal of Innovation in Enterprise System 3, no. 02 (2019): 31–41. http://dx.doi.org/10.25124/ijies.v3i02.38.
Full textHu, Teng, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, and Xiaosong Zhang. "Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats." Sensors 20, no. 18 (2020): 5297. http://dx.doi.org/10.3390/s20185297.
Full textAl-Mhiqani, Mohammed Nasser, Rabiah Ahmad, Z. Zainal Abidin, et al. "A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations." Applied Sciences 10, no. 15 (2020): 5208. http://dx.doi.org/10.3390/app10155208.
Full textPalaparthy, Keerthana, Y. Manohar Reddy, Jatoth Victor Paul, and S. Raju. "Enhancing Insider Threat Detection through Integrated Behavioral, Signature and Anomaly based Detection Methods." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem39835.
Full textKim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. http://dx.doi.org/10.3390/app9194018.
Full textSoleh, Musdi Muhammad. "A Study Case in NTMC POLRI: Reducing Data Breach Risk from Insider Threats by Using Risk IT Framework." ACMIT Proceedings 3, no. 1 (2019): 171–79. http://dx.doi.org/10.33555/acmit.v3i1.41.
Full textAlsowail, Rakan A., and Taher Al-Shehari. "A Multi-Tiered Framework for Insider Threat Prevention." Electronics 10, no. 9 (2021): 1005. http://dx.doi.org/10.3390/electronics10091005.
Full textHobbs, Christopher. "Insider threats." International Affairs 95, no. 3 (2019): 725–26. http://dx.doi.org/10.1093/ia/iiz084.
Full textNiblett, Gareth. "Insider Threats." ITNOW 58, no. 2 (2016): 23. http://dx.doi.org/10.1093/itnow/bww039.
Full textLuqman Hakim. "Insider Threats: The Cybersecurity Analysis using OCTAVE Allegro which are combined with HAIS-Q." Uranus : Jurnal Ilmiah Teknik Elektro, Sains dan Informatika 3, no. 1 (2025): 36–47. https://doi.org/10.61132/uranus.v3i1.649.
Full textMarshet Tamirat. "Current Detection Methods for Insider Threats and Social Engineering Attacks: Enhancements and Analysis Using Deep Learning." Journal of Electrical Systems 20, no. 11s (2024): 2838–53. https://doi.org/10.52783/jes.7966.
Full textAnatoly, Adamovich Kornienko, and Aleksandrovich Polyanichko Mark. "Insider Detection Method in a Company." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 2 (2019): 585–92. https://doi.org/10.35940/ijeat.A1452.129219.
Full textShevchenko, Svitlana, Yuliia Zhdanovа, Pavlo Skladannyi, and Sofia Boiko. "INSIDERS AND INSIDER INFORMATION: ESSENCE, THREATS, ACTIVITIES AND LEGAL RESPONSIBILITY." Cybersecurity: Education, Science, Technique 3, no. 15 (2022): 175–85. http://dx.doi.org/10.28925/2663-4023.2022.15.175185.
Full textAdikari, Swini. "Countering the Threat of Nuclear Terrorism Arising from Malicious Insiders." Global Affairs Review 1, no. 2 (2021): 1–18. http://dx.doi.org/10.51330/gar.0020214.
Full textYilmaz, Erhan, and Ozgu Can. "Unveiling Shadows: Harnessing Artificial Intelligence for Insider Threat Detection." Engineering, Technology & Applied Science Research 14, no. 2 (2024): 13341–46. http://dx.doi.org/10.48084/etasr.6911.
Full textBhandari, Durga, and Kumar Pudashine. "Insider Threat Detection using LSTM." Journal of Science and Technology 3, no. 1 (2023): 57–65. http://dx.doi.org/10.3126/jost.v3i1.69066.
Full textRuba, Ruba, and Hanan AlShaher. "Insider Threat Detection: Exploring User Event Behavior Analytics and Machine Learning in Security Reviews." Journal of Cybersecurity and Information Management 13, no. 2 (2024): 171–81. http://dx.doi.org/10.54216/jcim.130213.
Full textMohammed, Nasser Al-Mhiqani, Ahmad Rabiah, Zainal Abidin Zaheera, Yassin Warusia, Hassan Aslinda, and Natasha Mohammad Ameera. "New insider threat detection method based on recurrent neural networks." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 17, no. 3 (2020): 1474–79. https://doi.org/10.11591/ijeecs.v17.i3.pp1474-1479.
Full textTrivedi, Aayush. "Research Paper on Cybersecurity and Insider Threat Detection: The Role of User Behavior Analytics (UBA) in Modern Defense Strategies." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 455–66. https://doi.org/10.22214/ijraset.2025.66298.
Full textBurrell, Darrell Norman, Calvin Nobles, Austin Cusak, Marwan Omar, and Lemie Gillesania. "CYBERCRIME AND THE NATURE OF INSIDER THREAT COMPLEXITIES IN HEALTHCARE AND BIOTECHNOLOGY ENGINEERING ORGANIZATIONS." JOURNAL OF CRIME AND CRIMINAL BEHAVIOR 2, no. 2 (2022): 131–44. http://dx.doi.org/10.47509/jccb.2022.v02i02.04.
Full textNasser Al-mhiqani, Mohammed, Rabiah Ahmad, Zaheera Zainal Abidin, Warusia Yassin, Aslinda Hassan, and Ameera Natasha Mohammad. "New insider threat detection method based on recurrent neural networks." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (2020): 1474. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1474-1479.
Full textSaxena, Neetesh, Emma Hayes, Elisa Bertino, Patrick Ojo, Kim-Kwang Raymond Choo, and Pete Burnap. "Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses." Electronics 9, no. 9 (2020): 1460. http://dx.doi.org/10.3390/electronics9091460.
Full textA. Jones, Laura. "Unveiling Human Factors: Aligning Facets of Cybersecurity Leadership, Insider Threats, and Arsonist Attributes to Reduce Cyber Risk." SocioEconomic Challenges 8, no. 2 (2024): 44–63. http://dx.doi.org/10.61093/sec.8(2).44-63.2024.
Full textZatonatskiy, D., V. Marhasova, and N. Korogod. "INSIDER THREAT MANAGEMENT AS AN ELEMENT OF THE CORPORATE ECONOMIC SECURITY." Financial and credit activity: problems of theory and practice 1, no. 36 (2021): 149–58. http://dx.doi.org/10.18371/fcaptp.v1i36.227690.
Full textResearcher. "THE ROLE OF AI IN DETECTING INSIDER THREATS IN HEALTHCARE ORGANIZATIONS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 239–48. https://doi.org/10.5281/zenodo.13960643.
Full textZeng, Min, Chuanzhou Dian, and Yaoyao Wei. "Risk Assessment of Insider Threats Based on IHFACS-BN." Sustainability 15, no. 1 (2022): 491. http://dx.doi.org/10.3390/su15010491.
Full textIkiara, Charles Mwenda, Dr Boniface Ratemo, and Dr George Musumba. "Influence of Organizational Security Learning Practices on Insider Security Threats in SoCs in Kenya." International Journal of Scientific Research and Management (IJSRM) 12, no. 08 (2024): 7027–35. http://dx.doi.org/10.18535/ijsrm/v12i08.em04.
Full textSwapnil Chawande. "Insider threats in highly automated cyber systems." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 807–20. https://doi.org/10.30574/wjaets.2024.13.2.0642.
Full textClarke, Karla, Yair Levy, Laurie Dringus, and Shonda Brown. "How workplace satisfaction affects insider threat detection as a vital variable for the mitigation of malicious cyber insiders." Online Journal of Applied Knowledge Management 7, no. 1 (2019): 40–52. http://dx.doi.org/10.36965/ojakm.2019.7(1)40-52.
Full textAl-Shehari, Taher, and Rakan A. Alsowail. "An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques." Entropy 23, no. 10 (2021): 1258. http://dx.doi.org/10.3390/e23101258.
Full textAlthebyan, Qutaibah. "Mitigating Insider Threats on the Edge: A Knowledgebase Approach." International Arab Journal of Information Technology 17, no. 4A (2020): 621–28. http://dx.doi.org/10.34028/iajit/17/4a/6.
Full textSeo, Sang, and Dohoon Kim. "Study on Inside Threats Based on Analytic Hierarchy Process." Symmetry 12, no. 8 (2020): 1255. http://dx.doi.org/10.3390/sym12081255.
Full textAlsowail, Rakan A., and Taher Al-Shehari. "Techniques and countermeasures for preventing insider threats." PeerJ Computer Science 8 (April 1, 2022): e938. http://dx.doi.org/10.7717/peerj-cs.938.
Full textHenge, Santosh Kumar, Aditya Upadhyay, Ashok Kumar Saini, Neha Mishra, Dimpal Sharma, and Gajanand Sharma. "Analysis and detection of insider attacks using behaviour rule based architecture in enterprise multitenancy." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 707–18. http://dx.doi.org/10.47974/jdmsc-1743.
Full textWang, Jiarong, Qianran Sun, and Caiqiu Zhou. "Insider Threat Detection Based on Deep Clustering of Multi-Source Behavioral Events." Applied Sciences 13, no. 24 (2023): 13021. http://dx.doi.org/10.3390/app132413021.
Full textSREEKUMAR, SHREYA, SARANG C, ALKA SAJEEVAN P, VARNA O V, and ASWATHI V. "Insider Threat Detection Methodologies." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43389.
Full textKim, Jung Hwan, Chul Min Kim, and Man-Sung Yim. "An Investigation of Insider Threat Mitigation Based on EEG Signal Classification." Sensors 20, no. 21 (2020): 6365. http://dx.doi.org/10.3390/s20216365.
Full textJason Slaughter, Carole E. Chaski, and Kellep Charles. "Emotion analysis based on belief of targeted individual supporting insider threat detection." International Journal of Science and Research Archive 11, no. 2 (2024): 226–37. http://dx.doi.org/10.30574/ijsra.2024.11.2.0393.
Full textDr.Vijayalakshmi Chintamaneni, Dr.M.SreeRamu, and Shaik Abubakar Siddiq. "Insider Threats in the Age of Cyber Threat Intelligence: Behavioral Indicators and Detection Strategies." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 132–43. https://doi.org/10.46647/ijetms.2025.v09si01.022.
Full textSimonin, P., T. Kurbackaya, and P. Sizov. "Assessment of Insider Threats in the Personnel Security System of the Organization." Auditor 8, no. 10 (2022): 36–40. http://dx.doi.org/10.12737/1998-0701-2022-8-10-36-40.
Full textBoobalan, P. "Real-time Insider Attack Detection using Graph-Based Anomaly Detection and Concept Drift Handling." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 6221–27. https://doi.org/10.22214/ijraset.2025.69840.
Full textNicolaou, Andreas, Stavros Shiaeles, and Nick Savage. "Mitigating Insider Threats Using Bio-Inspired Models." Applied Sciences 10, no. 15 (2020): 5046. http://dx.doi.org/10.3390/app10155046.
Full textDadalko, V. A., and A. V. Ivashkina. "Insider threats and preventive methods." National Interests: Priorities and Security 14, no. 7 (2018): 1348–59. http://dx.doi.org/10.24891/ni.14.7.1348.
Full textProbst, Christian W. "Identifying and Mitigating Insider Threats." it - Information Technology 53, no. 4 (2011): 202–6. http://dx.doi.org/10.1524/itit.2011.0644.
Full textBertino, Elisa. "Data Protection from Insider Threats." Synthesis Lectures on Data Management 4, no. 4 (2012): 1–91. http://dx.doi.org/10.2200/s00431ed1v01y201207dtm028.
Full textJones, Laura, and Darrell Norman Burrell. "Illegal Cybersecurity Threats Created by Organizational Arsonists in Healthcare Organizations." Law, Economics and Society 1, no. 1 (2025): p93. https://doi.org/10.30560/les.v1n1p93.
Full textGaiduk, K. A., and A. Y. Iskhakov. "Using machine learning techniques for insider threat detection." Herald of the Siberian State University of Telecommunications and Informatics 16, no. 4 (2022): 80–95. http://dx.doi.org/10.55648/1998-6920-2022-16-4-80-95.
Full textYaramadhi, Mallikarjun, K. Subba Reddy, K. Rajendra Prasad, et al. "Prevent insider attacks, IAM (Identity and Access) solutions should be used in place of simple password-based authentication methods." Journal of Information and Optimization Sciences 46, no. 2 (2025): 509–19. https://doi.org/10.47974/jios-1931.
Full textQin, Heng, and Jin Hui Zhao. "Insider Threat Detection with Behavior-Based Attestation." Applied Mechanics and Materials 568-570 (June 2014): 1370–75. http://dx.doi.org/10.4028/www.scientific.net/amm.568-570.1370.
Full textKanellopoulos, Anastasios-Nikolaos. "Insider threat mitigation through human intelligence and counterintelligence: A case study in the shipping industry." Defense and Security Studies 5 (March 2, 2024): 10–19. http://dx.doi.org/10.37868/dss.v5.id261.
Full text