Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures
Insider threats are one of today's most challenging cybersecurity issues that are not well
addressed by commonly employed security solutions. In this work, we propose structural …
addressed by commonly employed security solutions. In this work, we propose structural …
Software-defined network (SDN) data plane security: issues, solutions, and future directions
Software-defined network (SDN) radically changes the network architecture by decoupling
the network logic from the underlying forwarding devices. This architectural change …
the network logic from the underlying forwarding devices. This architectural change …
PrivacyGuard: Enforcing private data usage with blockchain and attested execution
In the upcoming evolution of the Internet of Things (IoT), it is anticipated that billions of
devices will be connected to the Internet. Many of these devices are capable of collecting …
devices will be connected to the Internet. Many of these devices are capable of collecting …
Digital processing systems and methods for dual permission access in tables of collaborative work systems
T Haramati, A Hershkovitz, I Davidi… - US Patent …, 2023 - Google Patents
Abstract Systems and methods for regulating permission access in tablature are disclosed. A
system may include at least one processor configured to maintain a table having a plurality …
system may include at least one processor configured to maintain a table having a plurality …
Gargoyle: A network-based insider attack resilient framework for organizations
Anytime, Anywhere'data access model has become a widespread IT policy in organizations
making insider attacks even more complicated to model, predict and deter. Here, we …
making insider attacks even more complicated to model, predict and deter. Here, we …
Insider Threat Defense Strategies: Survey and Knowledge Integration
C Song, J Zhang, L Ma, X Hu, J Zheng… - … Conference on Knowledge …, 2024 - Springer
Insider threats are one of the most challenging cybersecurity issues today, and are receiving
increasing attention both in the computer science community and in the government and …
increasing attention both in the computer science community and in the government and …
Towards policy enforcement point as a service (peps)
In this paper, we coin the term Policy Enforcement as a Service (PEPS), which enables the
provision of innovative inter-layer and inter-domain Access Control. We leverage the …
provision of innovative inter-layer and inter-domain Access Control. We leverage the …
Task-Based Access Control for Computation and Communication in the Tactical Warfighting Edge
In the context of the Tactical Warfighting Edge (TWE) with dynamic interactions of edge
devices and users, cyber attacks can disrupt computation and communication (C&C) tasks in …
devices and users, cyber attacks can disrupt computation and communication (C&C) tasks in …
Digital processing systems and methods for external events trigger automatic text-based document alterations in collaborative work systems
R Zionpour, T Haramati, R Mann - US Patent 12,056,664, 2024 - Google Patents
Abstract Systems, methods, and computer-readable media for automatically altering
information within an electronic document based on an externally detected occurrence are …
information within an electronic document based on an externally detected occurrence are …
Digital processing systems and methods for table information displayed in and accessible via calendar in collaborative work systems
E Helft, S Frankel - US Patent 12,020,210, 2024 - Google Patents
Abstract Systems, methods, and computer-readable media for facilitating data visualization
in collaborative network systems in tablature are disclosed. The systems and methods may …
in collaborative network systems in tablature are disclosed. The systems and methods may …