Introduction to insider threat modeling, detection, and mitigation track

被引:0
|
作者
Dodge Jr., Ronald C. [1 ]
Ferguson, Aaron J. [2 ]
Cappelli, Dawn M. [3 ]
机构
[1] United States Military Academy, United States
[2] National Security Agency, United States
[3] CERT Insider Threat Center, United States
关键词
D O I
10.1109/HICSS.2012.356
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] An integrated system for insider threat detection
    Ray, Daniel
    Bradford, Phillip
    ADVANCES IN DIGITAL FORENSIC III, 2007, 242 : 75 - +
  • [32] A Tripwire Grammar for Insider Threat Detection
    Agrafiotis, Ioannis
    Erola, Arnau
    Goldsmith, Michael
    Creese, Sadie
    MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 105 - 108
  • [33] Machine Learning for Insider Threat Detection
    Naicker, Tristan Sashlen
    van Niekerk, Brett
    PROCEEDINGS OF THE 3RD EUROPEAN CONFERENCE ON THE IMPACT OF ARTIFICIAL INTELLIGENCE AND ROBOTICS (ECIAIR 2021), 2021, : 122 - 131
  • [34] Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
    Legg, Philip A.
    Buckley, Oliver
    Goldsmith, Michael
    Creese, Sadie
    2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,
  • [35] An Investigation of Insider Threat Mitigation Based on EEG Signal Classification
    Kim, Jung Hwan
    Kim, Chul Min
    Yim, Man-Sung
    SENSORS, 2020, 20 (21) : 1 - 17
  • [36] Unintentional Insider Threat: Contributing Factors, Observables, and Mitigation StrategiesAC
    Greitzer, Frank L.
    Strozer, Jeremy
    Cohen, Sholom
    Bergey, John
    Cowley, Jennifer
    Moore, Andrew
    Mundie, David
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 2025 - 2034
  • [37] Preventative directions for insider threat mitigation via access control
    Sinclair, Sara
    Smith, Sean W.
    INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 165 - 193
  • [38] Duplicity Games for Deception Design With an Application to Insider Threat Mitigation
    Huang, Linan
    Zhu, Quanyan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4843 - 4856
  • [39] A Framework for Insider Collusion Threat Prediction and Mitigation in Relational Databases
    Yaseen, Qussai
    Alabdulrazzaq, Aman
    Albalas, Firas
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 721 - 727
  • [40] Insider Threat Mitigation Using Moving Target Defense and Deception
    Takabi, Hassan
    Jafarian, J. Haadi
    PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, : 93 - 96