Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures
Insider threats are one of today's most challenging cybersecurity issues that are not well
addressed by commonly employed security solutions. In this work, we propose structural …
addressed by commonly employed security solutions. In this work, we propose structural …
Deep learning for insider threat detection: Review, challenges and opportunities
Insider threats, as one type of the most challenging threats in cyberspace, usually cause
significant loss to organizations. While the problem of insider threat detection has been …
significant loss to organizations. While the problem of insider threat detection has been …
Statistical fraud detection: A review
RJ Bolton, DJ Hand - Statistical science, 2002 - projecteuclid.org
Fraud is increasing dramatically with the expansion of modern technology and the global
superhighways of communication, resulting in the loss of billions of dollars worldwide each …
superhighways of communication, resulting in the loss of billions of dollars worldwide each …
Methods, systems, and media for detecting covert malware
BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …
some embodiments, a method for detecting covert malware in a computing environ ment is …
Methods, systems, and media for baiting inside attackers
SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …
[图书][B] Introduction to machine learning with applications in information security
M Stamp - 2022 - taylorfrancis.com
Introduction to Machine Learning with Applications in Information Security, Second Edition
provides a classroom-tested introduction to a wide variety of machine learning and deep …
provides a classroom-tested introduction to a wide variety of machine learning and deep …
[PDF][PDF] Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.
J Hunker, CW Probst - J. Wirel. Mob. Networks Ubiquitous Comput …, 2011 - isyou.info
Threats from the inside of an organization's perimeters are a significant problem, since it is
difficult to distinguish them from benign activity. In this overview article we discuss defining …
difficult to distinguish them from benign activity. In this overview article we discuss defining …
A survey of insider attack detection research
This paper surveys proposed solutions for the problem of insider attack detection appearing
in the computer security research literature. We distinguish between masqueraders and …
in the computer security research literature. We distinguish between masqueraders and …
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …
behavior are provided. In accordance with some embodiments, a method for detecting …
Behavioural biometrics: a survey and classification
RV Yampolskiy, V Govindaraju - International Journal of …, 2008 - inderscienceonline.com
This study is a survey and classification of the state-of-the-art in behavioural biometrics
which is based on skills, style, preference, knowledge, motor-skills or strategy used by …
which is based on skills, style, preference, knowledge, motor-skills or strategy used by …