Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures
Insider threats are one of today's most challenging cybersecurity issues that are not well
addressed by commonly employed security solutions. In this work, we propose structural …
addressed by commonly employed security solutions. In this work, we propose structural …
A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …
cybersecurity. This phenomenon indicates that threats require special detection systems …
A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments
Device security is one of the major challenges for successful implementation of Internet of
Things and fog computing environment in current IT space. Researchers and Information …
Things and fog computing environment in current IT space. Researchers and Information …
A new intelligent multilayer framework for insider threat detection
In several earlier studies, machine learning (ML) has been widely used for building insider
threat detection systems. However, the selection of the most appropriate ML classification …
threat detection systems. However, the selection of the most appropriate ML classification …
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
Intentional insider misuse of information systems resources (ie, IS misuse) represents a
significant threat to organizations. For example, industry statistics suggest that between 50 …
significant threat to organizations. For example, industry statistics suggest that between 50 …
Detecting insider threat via a cyber-security culture framework
A Georgiadou, S Mouzakitis… - Journal of Computer …, 2022 - Taylor & Francis
Insider threat has been recognized by both scientific community and security professionals
as one of the gravest security hazards for private companies, institutions, and governmental …
as one of the gravest security hazards for private companies, institutions, and governmental …
[PDF][PDF] Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.
J Hunker, CW Probst - J. Wirel. Mob. Networks Ubiquitous Comput …, 2011 - isyou.info
Threats from the inside of an organization's perimeters are a significant problem, since it is
difficult to distinguish them from benign activity. In this overview article we discuss defining …
difficult to distinguish them from benign activity. In this overview article we discuss defining …
Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis
Cyber security is vital to the success of today's digital economy. The major security threats
are coming from within, as opposed to outside forces. Insider threat detection and prediction …
are coming from within, as opposed to outside forces. Insider threat detection and prediction …
Behavioral analysis of insider threat: A survey and bootstrapped prediction in imbalanced data
The problem of insider threat is receiving increasing attention both within the computer
science community as well as government and industry. This paper starts by presenting a …
science community as well as government and industry. This paper starts by presenting a …
Taxonomy of compliant information security behavior
K Padayachee - Computers & Security, 2012 - Elsevier
This paper aims at surveying the extrinsic and intrinsic motivations that influence the
propensity toward compliant information security behavior. Information security behavior …
propensity toward compliant information security behavior. Information security behavior …