[HTML][HTML] Insider threat mitigation: Systematic literature review

U Inayat, M Farzan, S Mahmood, MF Zia… - Ain Shams Engineering …, 2024 - Elsevier
The increasing prevalence of cybercrime necessitates the implementation of robust security
measures. The majority of these attacks are initiated by authorized users who possess …

Insider threat detection using machine learning approach

B Bin Sarhan, N Altwaijry - Applied Sciences, 2022 - mdpi.com
Insider threats pose a critical challenge for securing computer networks and systems. They
are malicious activities by authorised users that can cause extensive damage, such as …

An efficient pattern-based approach for insider threat classification using the image-based feature representation

K Randive, R Mohan, AM Sivakrishna - Journal of Information Security and …, 2023 - Elsevier
Insider threats are expensive, difficult to detect, and sadly, on the rise. Despite significant
research efforts, existing approaches are inadequate in accuracy and precision. They also …

A taxonomic classification of insider threats: Existing techniques, future directions & recommendations

U Rauf, F Mohsen, Z Wei - Journal of Cyber Security and Mobility, 2023 - research.rug.nl
In the last two decades, the number of rapidly increasing cyber incidents (ie, data theft and
privacy breaches) shows that it is becoming enormously difficult for conventional defense …

BRITD: behavior rhythm insider threat detection with time awareness and user adaptation

S Song, N Gao, Y Zhang, C Ma - Cybersecurity, 2024 - Springer
Researchers usually detect insider threats by analyzing user behavior. The time information
of user behavior is an important concern in internal threat detection. Existing works on …

Employee watcher: a machine learning-based hybrid insider threat detection framework

U Rauf, Z Wei, F Mohsen - 2023 7th Cyber Security in …, 2023 - ieeexplore.ieee.org
Insider threats refer to harmful actions carried out by authorized users within an
organization, posing the most damaging risks. The increasing number of these threats has …

Research opportunity of insider threat detection based on machine learning methods

NTM Prajitno, H Hadiyanto… - … Conference on Artificial …, 2023 - ieeexplore.ieee.org
Insider threats have been a known threat since a long time ago in the information technology
field and many researchers tried to create novel methods to solve this threat. The purpose of …

E-Watcher: insider threat monitoring and detection for enhanced security

Z Wei, U Rauf, F Mohsen - Annals of Telecommunications, 2024 - Springer
Insider threats refer to harmful actions carried out by authorized users within an
organization, posing the most damaging risks. The increasing number of these threats has …

Emerging topics in defending networked systems

S Wendzel, W Mazurczyk, L Caviglione… - Future Generation …, 2022 - Elsevier
Emerging topics in defending networked systems - ScienceDirect Skip to main contentSkip to article
Elsevier logo Journals & Books Search RegisterSign in View PDF Download full issue Search …

A Pragmatic Enquiry to Learn Recent Trends in Insider Threat Detection Approaches

G Sandra, S Silas, EB Rajsingh - 2024 7th International …, 2024 - ieeexplore.ieee.org
Insider threat has become a recurring and serious challenge faced by organization
throughout the world. It shows an increasing trend from 2003 onwards. Due to the …