Sensing insider threat based on access vectors

被引:0
|
作者
Zhang, Hongbin [1 ]
Pei, Qingqi [2 ]
Wang, Chao [2 ]
Wang, Meihua [1 ]
机构
[1] Institute of Information Science and Engineering, Hebei Univ. of Science and Technology, Shijiazhuang 050018, China
[2] State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
关键词
D O I
10.3969/j.issn.1001-2400.2014.01.020
中图分类号
学科分类号
摘要
引用
收藏
页码:110 / 115
相关论文
共 50 条
  • [41] Honeypots: Catching the insider threat
    Spitzner, L
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 170 - 179
  • [42] Insider Threat Detection in PRODIGAL
    Goldberg, Henry G.
    Young, William T.
    Reardon, Matthew G.
    Phillips, Brian J.
    Senator, Ted E.
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2648 - 2657
  • [43] Safeguarding against the insider threat
    Bulpett B.
    Network Security, 2020, 2020 (06): : 14 - 17
  • [44] An insider threat detection method based on business process mining
    Zhu, Taiming
    Guo, Yuanbo
    Ju, Ankang
    Ma, Jun
    Wang, Xuan
    International Journal of Business Data Communications and Networking, 2017, 13 (02): : 83 - 98
  • [45] Dynamic Insider Threat Detection Based on Adaptable Genetic Programming
    Le, Duc C.
    Zincir-Heywood, A. Nur
    Heywood, Malcolm I.
    2019 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2019), 2019, : 2579 - 2586
  • [46] Image-Based Feature Representation for Insider Threat Classification
    Gayathri, R. G.
    Sajjanhar, Atul
    Xiang, Yong
    APPLIED SCIENCES-BASEL, 2020, 10 (14):
  • [47] Research on insider threat detection method based on variational autoencoding
    Zhang, Zhenjiang
    Zhao, Lulu
    Zhang, Yang
    Zhou, Hongde
    Li, Wei
    Journal of Computers (Taiwan), 2021, 32 (04) : 201 - 210
  • [48] Business Process Mining based Insider Threat Detection System
    Zhu, Taiming
    Guo, Yuanbo
    Ma, Jun
    Ju, Ankang
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 467 - 478
  • [49] Insider Threat Detection Using a Graph-Based Approach
    Eberle, William
    Graves, Jeffrey
    Holder, Lawrence
    JOURNAL OF APPLIED SECURITY RESEARCH, 2010, 6 (01) : 32 - 81
  • [50] An Investigation of Insider Threat Mitigation Based on EEG Signal Classification
    Kim, Jung Hwan
    Kim, Chul Min
    Yim, Man-Sung
    SENSORS, 2020, 20 (21) : 1 - 17