Academic literature on the topic 'Malicious insider'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malicious insider.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malicious insider"
Nguyen, Minh-Duong, Ngoc-Tu Chau, Seungwook Jung, and Souhwan Jung. "A Demonstration of Malicious Insider Attacks inside Cloud IaaS Vendor." International Journal of Information and Education Technology 4, no. 6 (2014): 483–86. http://dx.doi.org/10.7763/ijiet.2014.v4.455.
Full textJones, Andy. "Catching the malicious insider." Information Security Technical Report 13, no. 4 (2008): 220–24. http://dx.doi.org/10.1016/j.istr.2008.10.008.
Full textKim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. http://dx.doi.org/10.3390/app9194018.
Full textGlancy, Fletcher, David P. Biros, Nan Liang, and Andy Luse. "Classification of malicious insiders and the association of the forms of attacks." Journal of Criminal Psychology 10, no. 3 (2020): 233–47. http://dx.doi.org/10.1108/jcp-03-2020-0012.
Full textClarke, Karla, Yair Levy, Laurie Dringus, and Shonda Brown. "How workplace satisfaction affects insider threat detection as a vital variable for the mitigation of malicious cyber insiders." Online Journal of Applied Knowledge Management 7, no. 1 (2019): 40–52. http://dx.doi.org/10.36965/ojakm.2019.7(1)40-52.
Full textKim, Jung Hwan, Chul Min Kim, and Man-Sung Yim. "An Investigation of Insider Threat Mitigation Based on EEG Signal Classification." Sensors 20, no. 21 (2020): 6365. http://dx.doi.org/10.3390/s20216365.
Full textAdikari, Swini. "Countering the Threat of Nuclear Terrorism Arising from Malicious Insiders." Global Affairs Review 1, no. 2 (2021): 1–18. http://dx.doi.org/10.51330/gar.0020214.
Full textPark, Won, Youngin You, and Kyungho Lee. "Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media." Security and Communication Networks 2018 (July 18, 2018): 1–8. http://dx.doi.org/10.1155/2018/7243296.
Full textPolyanichko, M. "Methodology for Detecting Anomalous Interaction of Users with Information Assets to Identify Insider Activity." Proceedings of Telecommunication Universities 6, no. 1 (2020): 94–98. http://dx.doi.org/10.31854/1813-324x-2020-6-1-94-98.
Full textSaranjame, Rahul, and Manik Lal Das. "Securing Digital Image from Malicious Insider Attacks." International Journal of Computer Vision and Image Processing 8, no. 2 (2018): 49–58. http://dx.doi.org/10.4018/ijcvip.2018040103.
Full textDissertations / Theses on the topic "Malicious insider"
Schluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.
Full textClarke, Karla A. "Novel Alert Visualization: The Development of a Visual Analytics Prototype for Mitigation of Malicious Insider Cyber Threats." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1049.
Full textOfori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Full textLandress, Angela D. "The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites." Thesis, Nova Southeastern University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10842441.
Full textHueca, Angel L. "Development and Validation of a Proof-of-Concept Prototype for Analytics-based Malicious Cybersecurity Insider Threat in a Real-Time Identification System." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1063.
Full textKambhampaty, Krishna Kanth. "Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/29914.
Full textCheng, Chien-Wen, and 鄭傑文. "Identifying potentially malicious behavior inside Android malware by static code analysis." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/44175699278460400644.
Full textBooks on the topic "Malicious insider"
Dunham, Ken. Malicious bots: An inside look into the cyber-criminal underground of the internet. Auerbach Publications, 2008.
Find full textMalicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet. AUERBACH, 2008.
Find full textZhdanova, Mariia, and Dariya Orlova. Ukraine. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190931407.003.0003.
Full textBook chapters on the topic "Malicious insider"
Li, Weihan, Brajendra Panda, and Qussai Yaseen. "Malicious Users’ Transactions: Tackling Insider Threat." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30436-1_18.
Full textChen, Taolue, Florian Kammüller, Ibrahim Nemli, and Christian W. Probst. "A Probabilistic Analysis Framework for Malicious Insider Threats." In Lecture Notes in Computer Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20376-8_16.
Full textNiihara, Koichi, and Hiroaki Kikuchi. "Primary Factors of Malicious Insider in E-learning Model." In HCI International 2016 – Posters' Extended Abstracts. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40548-3_80.
Full textIbrahim, Amjad, Simon Rehwald, Antoine Scemama, Florian Andres, and Alexander Pretschner. "Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks." In Graphical Models for Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62230-5_1.
Full textFagade, Tesleem, Theo Spyridopoulos, Nabeel Albishry, and Theo Tryfonas. "System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis." In Human Aspects of Information Security, Privacy and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_21.
Full textHugl, Ulrike. "Putting a Hat on a Hen? Learnings for Malicious Insider Threat Prevention from the Background of German White-Collar Crime Research." In Lecture Notes in Computer Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20376-8_56.
Full textRagavan, Harini, and Brajendra Panda. "Mitigation of Malicious Modifications by Insiders in Databases." In Information Systems Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_23.
Full textStavrou, Angelos, Michael E. Locasto, and Angelos D. Keromytis. "Pushback for Overlay Networks: Protecting Against Malicious Insiders." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-68914-0_3.
Full textWang, Xiao, Jinqiao Shi, and Li Guo. "Towards Analyzing Traceability of Data Leakage by Malicious Insiders." In Trustworthy Computing and Services. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35795-4_19.
Full textRay, Indrajit, and Nayot Poolsapassit. "Using Attack Trees to Identify Malicious Attacks from Authorized Insiders." In Computer Security – ESORICS 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11555827_14.
Full textConference papers on the topic "Malicious insider"
Berk, Vincent H., George Cybenko, Ian Gregorio-de Souza, and John P. Murphy. "Managing Malicious Insider Risk through BANDIT." In 2012 45th Hawaii International Conference on System Sciences (HICSS). IEEE, 2012. http://dx.doi.org/10.1109/hicss.2012.420.
Full textPatil, Dinesh, and Bandu Meshram. "Network Packet Analysis for Detecting Malicious Insider." In 2018 3rd International Conference for Convergence in Technology (I2CT). IEEE, 2018. http://dx.doi.org/10.1109/i2ct.2018.8529451.
Full textGamachchi, Anagi, Li Sun, and Serdar Boztas. "Graph Based Framework for Malicious Insider Threat Detection." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2017. http://dx.doi.org/10.24251/hicss.2017.319.
Full textRagavan, Harini, and Brajendra Panda. "Mitigating Malicious Updates: Prevention of Insider Threat to Databases." In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2013. http://dx.doi.org/10.1109/trustcom.2013.95.
Full textNance, Kara, and Raffael Marty. "Identifying and Visualizing the Malicious Insider Threat Using Bipartite Graphs." In 2011 44th Hawaii International Conference on System Sciences (HICSS 2011). IEEE, 2011. http://dx.doi.org/10.1109/hicss.2011.231.
Full textHashem, Yassir, Hassan Takabi, Ram Dantu, and Rodney Nielsen. "A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3139923.3139930.
Full textChagarlamudi, Manideep, Brajendra Panda, and Yi Hu. "Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases." In 2009 Sixth International Conference on Information Technology: New Generations. IEEE, 2009. http://dx.doi.org/10.1109/itng.2009.67.
Full textLegg, Philip A. "Visualizing the insider threat: challenges and tools for identifying malicious user activity." In 2015 IEEE Symposium on Visualization for Cyber Security (VizSec). IEEE, 2015. http://dx.doi.org/10.1109/vizsec.2015.7312772.
Full textNikolai, Jason, and Yong Wang. "A System for Detecting Malicious Insider Data Theft in IaaS Cloud Environments." In GLOBECOM 2016 - 2016 IEEE Global Communications Conference. IEEE, 2016. http://dx.doi.org/10.1109/glocom.2016.7841554.
Full textNkosi, Lucky, Paul Tarwireyi, and Matthew O. Adigun. "Detecting a malicious insider in the cloud environment using sequential rule mining." In 2013 International Conference on Adaptive Science and Technology (ICAST). IEEE, 2013. http://dx.doi.org/10.1109/icastech.2013.6707505.
Full textReports on the topic "Malicious insider"
Silowash, George J., and Todd B. Lewellen. Insider Threat Control: Using Universal Serial Bus (USB) Device Auditing to Detect Possible Data Exfiltration by Malicious Insiders. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada610588.
Full textKelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Full textNoonan, Christine F. Spy the Lie: Detecting Malicious Insiders. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1452870.
Full textHerzog, Jonathan, Gabriel Wachman, and Dan Liu. On the Robustness of Cognitive Networking Mechanisms to Malicious Insiders. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada573492.
Full text