Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures

I Homoliak, F Toffalini, J Guarnizo, Y Elovici… - ACM Computing …, 2019 - dl.acm.org
Insider threats are one of today's most challenging cybersecurity issues that are not well
addressed by commonly employed security solutions. In this work, we propose structural …

Deep learning for insider threat detection: Review, challenges and opportunities

S Yuan, X Wu - Computers & Security, 2021 - Elsevier
Insider threats, as one type of the most challenging threats in cyberspace, usually cause
significant loss to organizations. While the problem of insider threat detection has been …

Statistical fraud detection: A review

RJ Bolton, DJ Hand - Statistical science, 2002 - projecteuclid.org
Fraud is increasing dramatically with the expansion of modern technology and the global
superhighways of communication, resulting in the loss of billions of dollars worldwide each …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

Methods, systems, and media for baiting inside attackers

SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …

[图书][B] Introduction to machine learning with applications in information security

M Stamp - 2022 - taylorfrancis.com
Introduction to Machine Learning with Applications in Information Security, Second Edition
provides a classroom-tested introduction to a wide variety of machine learning and deep …

[PDF][PDF] Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.

J Hunker, CW Probst - J. Wirel. Mob. Networks Ubiquitous Comput …, 2011 - isyou.info
Threats from the inside of an organization's perimeters are a significant problem, since it is
difficult to distinguish them from benign activity. In this overview article we discuss defining …

A survey of insider attack detection research

MB Salem, S Hershkop, SJ Stolfo - … Attack and Cyber Security: Beyond the …, 2008 - Springer
This paper surveys proposed solutions for the problem of insider attack detection appearing
in the computer security research literature. We distinguish between masqueraders and …

Methods, systems, and media for masquerade attack detection by monitoring computer user behavior

SJ Stolfo, MB Salem, S Hershkop - US Patent 8,769,684, 2014 - Google Patents
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …

Behavioural biometrics: a survey and classification

RV Yampolskiy, V Govindaraju - International Journal of …, 2008 - inderscienceonline.com
This study is a survey and classification of the state-of-the-art in behavioural biometrics
which is based on skills, style, preference, knowledge, motor-skills or strategy used by …