Introduction to insider threat modeling, detection, and mitigation track

被引:0
|
作者
Dodge Jr., Ronald C. [1 ]
Ferguson, Aaron J. [2 ]
Cappelli, Dawn M. [3 ]
机构
[1] United States Military Academy, United States
[2] National Security Agency, United States
[3] CERT Insider Threat Center, United States
关键词
D O I
10.1109/HICSS.2012.356
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Insider threat mitigation: preventing unauthorized knowledge acquisition
    Yaseen, Qussai
    Panda, Brajendra
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (04) : 269 - 280
  • [22] Insider threat mitigation: preventing unauthorized knowledge acquisition
    Qussai Yaseen
    Brajendra Panda
    International Journal of Information Security, 2012, 11 : 269 - 280
  • [23] VISTA: An inclusive insider threat taxonomy, with mitigation strategies
    Renaud, Karen
    Warkentin, Merrill
    Pogrebna, Ganna
    van der Schyff, Karl
    INFORMATION & MANAGEMENT, 2024, 61 (01)
  • [24] Modeling the emergence of insider threat vulnerabilities
    Martinez-Moyano, Ignacio J.
    Rich, Eliot H.
    Conrad, Stephen H.
    Andersen, David F.
    PROCEEDINGS OF THE 2006 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2006, : 562 - +
  • [25] AGENT IMPLEMENTATION FOR MODELING INSIDER THREAT
    Sokolowski, John A.
    Banks, Catherine M.
    2015 WINTER SIMULATION CONFERENCE (WSC), 2015, : 266 - 275
  • [26] Contrastive Learning for Insider Threat Detection
    Vinay, M. S.
    Yuan, Shuhan
    Wu, Xintao
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2022, PT I, 2022, : 395 - 403
  • [27] Weak models for insider threat detection
    Thompson, P
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE(C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE III, PTS 1 AND 2, 2004, 5403 : 40 - 48
  • [28] Review on Insider Threat Detection Techniques
    Oladimeji, T. O.
    Ayo, C. K.
    Adewumi, S. E.
    3RD INTERNATIONAL CONFERENCE ON SCIENCE AND SUSTAINABLE DEVELOPMENT (ICSSD 2019): SCIENCE, TECHNOLOGY AND RESEARCH: KEYS TO SUSTAINABLE DEVELOPMENT, 2019, 1299
  • [29] Insider Threat Detection and Cloud Computing
    Choudhary, Arjun
    Bhadada, Rajesh
    ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 81 - 90
  • [30] Analytics for early detection of insider threat
    Fenstermacher, Laurie
    Larson, Kathleen
    Vitiello, Christine
    Shellman, Steve
    Levey, Brian
    SIGNAL PROCESSING, SENSOR/INFORMATION FUSION, AND TARGET RECOGNITION XXXI, 2022, 12122