[HTML][HTML] Insider threat mitigation: Systematic literature review
The increasing prevalence of cybercrime necessitates the implementation of robust security
measures. The majority of these attacks are initiated by authorized users who possess …
measures. The majority of these attacks are initiated by authorized users who possess …
Insider threat detection using machine learning approach
B Bin Sarhan, N Altwaijry - Applied Sciences, 2022 - mdpi.com
Insider threats pose a critical challenge for securing computer networks and systems. They
are malicious activities by authorised users that can cause extensive damage, such as …
are malicious activities by authorised users that can cause extensive damage, such as …
An efficient pattern-based approach for insider threat classification using the image-based feature representation
Insider threats are expensive, difficult to detect, and sadly, on the rise. Despite significant
research efforts, existing approaches are inadequate in accuracy and precision. They also …
research efforts, existing approaches are inadequate in accuracy and precision. They also …
A taxonomic classification of insider threats: Existing techniques, future directions & recommendations
In the last two decades, the number of rapidly increasing cyber incidents (ie, data theft and
privacy breaches) shows that it is becoming enormously difficult for conventional defense …
privacy breaches) shows that it is becoming enormously difficult for conventional defense …
BRITD: behavior rhythm insider threat detection with time awareness and user adaptation
Researchers usually detect insider threats by analyzing user behavior. The time information
of user behavior is an important concern in internal threat detection. Existing works on …
of user behavior is an important concern in internal threat detection. Existing works on …
Employee watcher: a machine learning-based hybrid insider threat detection framework
Insider threats refer to harmful actions carried out by authorized users within an
organization, posing the most damaging risks. The increasing number of these threats has …
organization, posing the most damaging risks. The increasing number of these threats has …
Research opportunity of insider threat detection based on machine learning methods
NTM Prajitno, H Hadiyanto… - … Conference on Artificial …, 2023 - ieeexplore.ieee.org
Insider threats have been a known threat since a long time ago in the information technology
field and many researchers tried to create novel methods to solve this threat. The purpose of …
field and many researchers tried to create novel methods to solve this threat. The purpose of …
E-Watcher: insider threat monitoring and detection for enhanced security
Insider threats refer to harmful actions carried out by authorized users within an
organization, posing the most damaging risks. The increasing number of these threats has …
organization, posing the most damaging risks. The increasing number of these threats has …
Emerging topics in defending networked systems
Emerging topics in defending networked systems - ScienceDirect Skip to main contentSkip to article
Elsevier logo Journals & Books Search RegisterSign in View PDF Download full issue Search …
Elsevier logo Journals & Books Search RegisterSign in View PDF Download full issue Search …
A Pragmatic Enquiry to Learn Recent Trends in Insider Threat Detection Approaches
G Sandra, S Silas, EB Rajsingh - 2024 7th International …, 2024 - ieeexplore.ieee.org
Insider threat has become a recurring and serious challenge faced by organization
throughout the world. It shows an increasing trend from 2003 onwards. Due to the …
throughout the world. It shows an increasing trend from 2003 onwards. Due to the …