Sensing insider threat based on access vectors

被引:0
|
作者
Zhang, Hongbin [1 ]
Pei, Qingqi [2 ]
Wang, Chao [2 ]
Wang, Meihua [1 ]
机构
[1] Institute of Information Science and Engineering, Hebei Univ. of Science and Technology, Shijiazhuang 050018, China
[2] State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
关键词
D O I
10.3969/j.issn.1001-2400.2014.01.020
中图分类号
学科分类号
摘要
引用
收藏
页码:110 / 115
相关论文
共 50 条
  • [21] Graph-based insider threat detection: A survey
    Gong, Yiru
    Cui, Susu
    Liu, Song
    Jiang, Bo
    Dong, Cong
    Lu, Zhigang
    COMPUTER NETWORKS, 2024, 254
  • [22] An agent-based approach to modeling insider threat
    Sokolowski, John A.
    Banks, Catherine M.
    Dover, Thomas J.
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2016, 22 (03) : 273 - 287
  • [23] A Predictive Model of Insider Threat Based on Bayesian Network
    Wang, Hui
    Wang, Yunfeng
    Yang, Guangcan
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2013, 9 (SPL.ISSUE4) : 69 - 74
  • [24] A Graph Based Framework for Malicious Insider Threat Detection
    Gamachchi, Anagi
    Sun, Li
    Boztas, Serdar
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2638 - 2647
  • [25] Machine learning based Insider Threat Modelling and Detection
    Le, Duc C.
    Zincir-Heywood, A. Nur
    2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019,
  • [26] An agent-based approach to modeling insider threat
    John A. Sokolowski
    Catherine M. Banks
    Thomas J. Dover
    Computational and Mathematical Organization Theory, 2016, 22 : 273 - 287
  • [27] RAP-Net: A Resource Access Pattern Network for Insider Threat Detection
    Zhu, Dali
    Huang, Xianjin
    Li, Nan
    Sun, Hongju
    Liu, Meichen
    Liu, Jiguo
    2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [28] Unsupervised Ensemble based Learning for Insider Threat Detection
    Parveen, Pallabi
    McDaniel, Nate
    Hariharan, Varun S.
    Thuraisingham, Bhavani
    Khan, Latifur
    PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, : 718 - 727
  • [29] Insider Threat Risk Prediction based on Bayesian Network
    Elmrabit, Nebrase
    Yang, Shuang-Hua
    Yang, Lili
    Zhou, Huiyu
    COMPUTERS & SECURITY, 2020, 96
  • [30] Insider threat detection for specific threat scenarios
    Tian, Tian
    Zhang, Chen
    Jiang, Bo
    Feng, Huamin
    Lu, Zhigang
    CYBERSECURITY, 2025, 8 (01):