-
1
Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs
Published 2019-01-01Subjects: Get full text
Article -
2
The Human Factor in Cybersecurity: Addressing the Risks of Insider Threats
Published 2025-01-01Subjects: Get full text
Article -
3
Why and how unpredictability is implemented in aviation security – A first qualitative study
Published 2023-03-01Subjects: Get full text
Article -
4
A model to reduce insider cybersecurity threats in a South African telecommunications company
Published 2022-10-01Subjects: Get full text
Article -
5
On Identification of Intrusive Applications: A Step Toward Heuristics-Based Adaptive Security Policy
Published 2024-01-01Subjects: “…Insider threats…”
Get full text
Article -
6
A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations
Published 2020-07-01Subjects: Get full text
Article -
7
Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
Published 2020-04-01Subjects: “…insider threats…”
Get full text
Article -
8
VisTAS: blockchain-based visible and trusted remote authentication system
Published 2021-05-01Subjects: Get full text
Article -
9
Anomaly-based threat detection in smart health using machine learning
Published 2024-11-01Subjects: Get full text
Article -
10
Self-adaptive authorisation in OpenStack cloud platform
Published 2018-09-01Subjects: Get full text
Article -
11
DEVELOPMENT OF INFORMATION SECURITY INSIDER THREAT CLASSIFICATION USING INCIDENT CLUSTERING
Published 2016-10-01Subjects: “…classification of information security insider threats…”
Get full text
Article -
12
A Review of the Insider Threat, a Practitioner Perspective Within the U.K. Financial Services
Published 2024-01-01Subjects: Get full text
Article -
13
Analysis of Insider Threats in the Healthcare Industry: A Text Mining Approach
Published 2022-08-01Subjects: “…insider threats…”
Get full text
Article -
14
Novel EEG Sensor-Based Risk Framework for the Detection of Insider Threats in Safety Critical Industrial Infrastructure
Published 2020-01-01Subjects: Get full text
Article -
15
Beyond Firewall: Leveraging Machine Learning for Real-Time Insider Threats Identification and User Profiling
Published 2025-02-01Subjects: “…insider threats…”
Get full text
Article -
16
Insider: Main Characteristics and Complexity Opposition
Published 2011-12-01Subjects: “…complexity opposition of insider threat…”
Get full text
Article -
17
Hacking a Bridge: An Exploratory Study of Compliance-Based Information Security Management in Banking Organization
Published 2017-10-01Subjects: Get full text
Article -
18
Mitigating Insider Threats Using Bio-Inspired Models
Published 2020-07-01Subjects: Get full text
Article -
19
Detecting and Identifying Insider Threats Based on Advanced Clustering Methods
Published 2024-01-01Subjects: Get full text
Article -
20
Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector
Published 2025-02-01Subjects: Get full text
Article