Journal articles on the topic 'Malicious insider'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Malicious insider.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nguyen, Minh-Duong, Ngoc-Tu Chau, Seungwook Jung, and Souhwan Jung. "A Demonstration of Malicious Insider Attacks inside Cloud IaaS Vendor." International Journal of Information and Education Technology 4, no. 6 (2014): 483–86. http://dx.doi.org/10.7763/ijiet.2014.v4.455.
Full textJones, Andy. "Catching the malicious insider." Information Security Technical Report 13, no. 4 (2008): 220–24. http://dx.doi.org/10.1016/j.istr.2008.10.008.
Full textKim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. http://dx.doi.org/10.3390/app9194018.
Full textGlancy, Fletcher, David P. Biros, Nan Liang, and Andy Luse. "Classification of malicious insiders and the association of the forms of attacks." Journal of Criminal Psychology 10, no. 3 (2020): 233–47. http://dx.doi.org/10.1108/jcp-03-2020-0012.
Full textClarke, Karla, Yair Levy, Laurie Dringus, and Shonda Brown. "How workplace satisfaction affects insider threat detection as a vital variable for the mitigation of malicious cyber insiders." Online Journal of Applied Knowledge Management 7, no. 1 (2019): 40–52. http://dx.doi.org/10.36965/ojakm.2019.7(1)40-52.
Full textKim, Jung Hwan, Chul Min Kim, and Man-Sung Yim. "An Investigation of Insider Threat Mitigation Based on EEG Signal Classification." Sensors 20, no. 21 (2020): 6365. http://dx.doi.org/10.3390/s20216365.
Full textAdikari, Swini. "Countering the Threat of Nuclear Terrorism Arising from Malicious Insiders." Global Affairs Review 1, no. 2 (2021): 1–18. http://dx.doi.org/10.51330/gar.0020214.
Full textPark, Won, Youngin You, and Kyungho Lee. "Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media." Security and Communication Networks 2018 (July 18, 2018): 1–8. http://dx.doi.org/10.1155/2018/7243296.
Full textPolyanichko, M. "Methodology for Detecting Anomalous Interaction of Users with Information Assets to Identify Insider Activity." Proceedings of Telecommunication Universities 6, no. 1 (2020): 94–98. http://dx.doi.org/10.31854/1813-324x-2020-6-1-94-98.
Full textSaranjame, Rahul, and Manik Lal Das. "Securing Digital Image from Malicious Insider Attacks." International Journal of Computer Vision and Image Processing 8, no. 2 (2018): 49–58. http://dx.doi.org/10.4018/ijcvip.2018040103.
Full textLiang, Nan (Peter), David P. Biros, and Andy Luse. "An Empirical Validation of Malicious Insider Characteristics." Journal of Management Information Systems 33, no. 2 (2016): 361–92. http://dx.doi.org/10.1080/07421222.2016.1205925.
Full textGayathri, R. G., Atul Sajjanhar, and Yong Xiang. "Image-Based Feature Representation for Insider Threat Classification." Applied Sciences 10, no. 14 (2020): 4945. http://dx.doi.org/10.3390/app10144945.
Full textG S, Smrithy, Alfredo Cuzzocrea, and Ramadoss Balakrishnan. "Detecting Insider Malicious Activities in Cloud Collaboration Systems." Fundamenta Informaticae 161, no. 3 (2018): 299–316. http://dx.doi.org/10.3233/fi-2018-1704.
Full textOberoi, Priya, Sumit Mittal, and Rajneesh Kumar Gujral. "ADRCN: A Framework to Detect and Mitigate Malicious Insider Attacks in Cloud-Based Environment on IaaS." International Journal of Mathematical, Engineering and Management Sciences 4, no. 3 (2019): 654–70. http://dx.doi.org/10.33889//ijmems.2019.4.3-052.
Full textAnkayarkanni, B. "Alleviating Malicious Insider in Cloud Through Offensive Decoy Technology." International Journal on Information Sciences and Computing 8, no. 2 (2014): 1–6. http://dx.doi.org/10.18000/ijisac.50145.
Full textKhan, Ahmed Yar, Rabia Latif, Seemab Latif, Shahzaib Tahir, Gohar Batool, and Tanzila Saba. "Malicious Insider Attack Detection in IoTs Using Data Analytics." IEEE Access 8 (2020): 11743–53. http://dx.doi.org/10.1109/access.2019.2959047.
Full textAhmad, Mir Shahnawaz, and Shahid Mehraj Shah. "Mitigating Malicious Insider Attacks in the Internet of Things using Supervised Machine Learning Techniques." Scalable Computing: Practice and Experience 22, no. 1 (2021): 13–28. http://dx.doi.org/10.12694/scpe.v22i1.1818.
Full textGunasekhar, T., K. Thirupathi Rao, V. Krishna Reddy, P. Sai Kiran, and B. Thirumala Rao. "Mitigation of Insider Attacks through Multi-Cloud." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 1 (2015): 136. http://dx.doi.org/10.11591/ijece.v5i1.pp136-141.
Full textMichael, Antonia, and Jan Eloff. "Discovering “Insider IT Sabotage” based on human behaviour." Information & Computer Security 28, no. 4 (2020): 575–89. http://dx.doi.org/10.1108/ics-12-2019-0141.
Full textAl-Mhiqani, Mohammed Nasser, Rabiah Ahmad, Z. Zainal Abidin, et al. "A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations." Applied Sciences 10, no. 15 (2020): 5208. http://dx.doi.org/10.3390/app10155208.
Full textFurnell, Steven. "Malicious or misinformed? Exploring a contributor to the insider threat." Computer Fraud & Security 2006, no. 9 (2006): 8–12. http://dx.doi.org/10.1016/s1361-3723(06)70419-5.
Full textWalker, Terrence. "Practical management of malicious insider threat – An enterprise CSIRT perspective." Information Security Technical Report 13, no. 4 (2008): 225–34. http://dx.doi.org/10.1016/j.istr.2008.10.013.
Full textStafford, Thomas, George Deitz, and Yaojie Li. "The role of internal audit and user training in information security policy compliance." Managerial Auditing Journal 33, no. 4 (2018): 410–24. http://dx.doi.org/10.1108/maj-07-2017-1596.
Full textShaw, Eric D. "The role of behavioral research and profiling in malicious cyber insider investigations." Digital Investigation 3, no. 1 (2006): 20–31. http://dx.doi.org/10.1016/j.diin.2006.01.006.
Full textPARVEEN, PALLABI, NATHAN MCDANIEL, ZACKARY WEGER, et al. "EVOLVING INSIDER THREAT DETECTION STREAM MINING PERSPECTIVE." International Journal on Artificial Intelligence Tools 22, no. 05 (2013): 1360013. http://dx.doi.org/10.1142/s0218213013600130.
Full textAhmad, Shahnawaz. "Alleviating Malicious Insider Attacks in MANET using a Multipath On-demand Security Mechanism." International Journal of Computer Network and Information Security 10, no. 6 (2018): 40–51. http://dx.doi.org/10.5815/ijcnis.2018.06.04.
Full textKumar, Gulshan, Mritunjay Kumar Rai, Hye-jin Kim, and Rahul Saha. "A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks." Mobile Information Systems 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/3243570.
Full textAl Sharah, Ashraf, Taiwo Oyedare, and Sachin Shetty. "Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game." Journal of Computer Networks and Communications 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/4289176.
Full textKotenko, Igor, Andrey Krasov, Igor Ushakov, and Konstantin Izrailov. "An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database." Journal of Sensor and Actuator Networks 10, no. 2 (2021): 25. http://dx.doi.org/10.3390/jsan10020025.
Full textKong, Fan Yu, Lu Hong Diao, Jia Yu, Ya Li Jiang, and Da Shui Zhou. "Insider Forgery Cryptanalysis of Two Post-Quantum Multi-Signature Schemes." Applied Mechanics and Materials 437 (October 2013): 876–79. http://dx.doi.org/10.4028/www.scientific.net/amm.437.876.
Full textSheykhkanloo, Naghmeh Moradpoor, and Adam Hall. "Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset." International Journal of Cyber Warfare and Terrorism 10, no. 2 (2020): 1–26. http://dx.doi.org/10.4018/ijcwt.2020040101.
Full textLi, Dongyang, Lin Yang, Hongguang Zhang, Xiaolei Wang, Linru Ma, and Junchao Xiao. "Image-Based Insider Threat Detection via Geometric Transformation." Security and Communication Networks 2021 (September 13, 2021): 1–18. http://dx.doi.org/10.1155/2021/1777536.
Full textBerman, Daniel, Anna Buczak, Jeffrey Chavis, and Cherita Corbett. "A Survey of Deep Learning Methods for Cyber Security." Information 10, no. 4 (2019): 122. http://dx.doi.org/10.3390/info10040122.
Full textMaestre Vidal, Jorge, and Marco Antonio Sotelo Monge. "Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features." Sensors 20, no. 7 (2020): 2084. http://dx.doi.org/10.3390/s20072084.
Full textOberoi, Priya, Sumit Mittal, and Rajneesh Kumar Gujral. "ARCN: Authenticated Routing on Cloud Network to Mitigate Insider Attacks on Infrastructure as a Service." Journal of Computational and Theoretical Nanoscience 16, no. 9 (2019): 3945–54. http://dx.doi.org/10.1166/jctn.2019.8275.
Full textRao, O. Srinivasa, and K. Madhuri. "Path Reconstruction and Effective Routing with Advanced Congestion Diversity in Wireless Adhoc Networks." International Journal of Emerging Research in Management and Technology 6, no. 9 (2018): 125. http://dx.doi.org/10.23956/ijermt.v6i9.96.
Full textGupta, Radhika, Dr Sahil Verma, Dr Kavita, and Anup Ial Yadav. "A Comparative Analysis of Trust Based Applications in Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 4.12 (2018): 73. http://dx.doi.org/10.14419/ijet.v7i4.12.20996.
Full textJayashree, Devasagayam, V. Uma Rani, and K. Soma Sundaram. "Trust Based Misbehavior Detection in Wireless Sensor Networks." Applied Mechanics and Materials 622 (August 2014): 191–98. http://dx.doi.org/10.4028/www.scientific.net/amm.622.191.
Full textSingh, Nagendra Kumar, and Sandeep Kumar Nayak. "The Threat Detection Framework for Securing Semantic Web Services." Journal of Computational and Theoretical Nanoscience 16, no. 12 (2019): 5099–104. http://dx.doi.org/10.1166/jctn.2019.8569.
Full textY. F. Al_Sahlani, Ahmed, and Songfeng Lu. "Lightweight Communication Overhead Authentication Scheme Using Smart Card." Indonesian Journal of Electrical Engineering and Computer Science 1, no. 3 (2016): 597. http://dx.doi.org/10.11591/ijeecs.v1.i3.pp597-606.
Full textBrahma, Anitarani, and Suvasini Panigrahi. "Role-Based Profiling Using Fuzzy Adaptive Resonance Theory for Securing Database Systems." International Journal of Applied Metaheuristic Computing 12, no. 2 (2021): 36–48. http://dx.doi.org/10.4018/ijamc.2021040103.
Full textSiddiqui, Sarah Ali, Adnan Mahmood, Quan Z. Sheng, Hajime Suzuki, and Wei Ni. "A Survey of Trust Management in the Internet of Vehicles." Electronics 10, no. 18 (2021): 2223. http://dx.doi.org/10.3390/electronics10182223.
Full textPanda, Niranjan, and Binod Kumar Pattanayak. "Energy aware detection and prevention of black hole attack in MANET." International Journal of Engineering & Technology 7, no. 2.6 (2018): 135. http://dx.doi.org/10.14419/ijet.v7i2.6.10139.
Full textBukkawar, Mrunali, and Mohd Shafi Pathan. "Web-Proxy-Based Authentication and Authorization Mechanism Against Client-Based HTTP Attacks." International Journal of Synthetic Emotions 8, no. 1 (2017): 60–72. http://dx.doi.org/10.4018/ijse.2017010105.
Full textCui, Jianming, Xiaojun Zhang, Ning Cao, Dexue Zhang, Jianrui Ding, and Guofu Li. "An improved authentication protocol–based dynamic identity for multi-server environments." International Journal of Distributed Sensor Networks 14, no. 5 (2018): 155014771877765. http://dx.doi.org/10.1177/1550147718777654.
Full textChen, Dr Joy Iong Zong, and Dr Smys S. "Social Multimedia Security and Suspicious Activity Detection in SDN using Hybrid Deep Learning Technique." June 2020 2, no. 2 (2020): 108–15. http://dx.doi.org/10.36548/jitdw.2020.2.004.
Full textOmar, Marwan, Derek Mohammed, and Van Nguyen. "Defending against malicious insiders: a conceptual framework for predicting, detecting, and deterring malicious insiders." International Journal of Business Process Integration and Management 8, no. 2 (2017): 114. http://dx.doi.org/10.1504/ijbpim.2017.083794.
Full textOmar, Marwan, Derek Mohammed, and Van Nguyen. "Defending against malicious insiders: a conceptual framework for predicting, detecting, and deterring malicious insiders." International Journal of Business Process Integration and Management 8, no. 2 (2017): 114. http://dx.doi.org/10.1504/ijbpim.2017.10004538.
Full textTalukdar, Md Ibrahim, Rosilah Hassan, Md Sharif Hossen, Khaleel Ahmad, Faizan Qamar, and Amjed Sid Ahmed. "Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature." Wireless Communications and Mobile Computing 2021 (March 2, 2021): 1–13. http://dx.doi.org/10.1155/2021/6693316.
Full textBadhani, Shikha, and Sunil K. Muttoo. "Evading android anti-malware by hiding malicious application inside images." International Journal of System Assurance Engineering and Management 9, no. 2 (2017): 482–93. http://dx.doi.org/10.1007/s13198-017-0692-7.
Full text