Detecting and preventing cyber insider threats: A survey
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …
security threats, the majority of which are originated by insiders. As insiders reside behind …
Statistical fraud detection: A review
RJ Bolton, DJ Hand - Statistical science, 2002 - projecteuclid.org
Fraud is increasing dramatically with the expansion of modern technology and the global
superhighways of communication, resulting in the loss of billions of dollars worldwide each …
superhighways of communication, resulting in the loss of billions of dollars worldwide each …
Random forest for credit card fraud detection
S Xuan, G Liu, Z Li, L Zheng, S Wang… - 2018 IEEE 15th …, 2018 - ieeexplore.ieee.org
Credit card fraud events take place frequently and then result in huge financial losses.
Criminals can use some technologies such as Trojan or Phishing to steal the information of …
Criminals can use some technologies such as Trojan or Phishing to steal the information of …
Methods, systems, and media for detecting covert malware
BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …
some embodiments, a method for detecting covert malware in a computing environ ment is …
Methods, systems, and media for baiting inside attackers
SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …
[PDF][PDF] Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.
J Hunker, CW Probst - J. Wirel. Mob. Networks Ubiquitous Comput …, 2011 - isyou.info
Threats from the inside of an organization's perimeters are a significant problem, since it is
difficult to distinguish them from benign activity. In this overview article we discuss defining …
difficult to distinguish them from benign activity. In this overview article we discuss defining …
A survey of insider attack detection research
This paper surveys proposed solutions for the problem of insider attack detection appearing
in the computer security research literature. We distinguish between masqueraders and …
in the computer security research literature. We distinguish between masqueraders and …
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …
behavior are provided. In accordance with some embodiments, a method for detecting …
Computer intrusion: Detecting masquerades
M Schonlau, W DuMouchel, WH Ju, AF Karr, M Theus… - Statistical science, 2001 - JSTOR
Masqueraders in computer intrusion detection are people who use somebody else's
computer account. We investigate a number of statistical approaches for detecting …
computer account. We investigate a number of statistical approaches for detecting …
Masquerade detection using truncated command lines
RA Maxion, TN Townsend - … international conference on …, 2002 - ieeexplore.ieee.org
A masquerade attack, in which one user impersonates another, can be the most serious
form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by …
form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by …