A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations

MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin… - Applied Sciences, 2020 - mdpi.com
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …

Protecting organizational competitive advantage: A knowledge leakage perspective

A Ahmad, R Bosua, R Scheepers - Computers & Security, 2014 - Elsevier
The strategic management literature emphasizes the importance of protecting organizational
knowledge and information, especially in terms of maintaining competitive advantage. We …

Data loss prevention solution for Linux endpoint devices

L Daubner, A Považanec - … of the 18th International Conference on …, 2023 - dl.acm.org
Endpoint data loss prevention (DLP) software monitors and protects data on the endpoint
against accidental and malicious leakage. While the risk of such leakage is widely present in …

[PDF][PDF] Guarding against the erosion of competitive advantage: a knowledge leakage mitigation model

A Ahmad, H Tscherning, R Bosua, R Scheepers - 2015 - core.ac.uk
A critical objective of knowledge-intensive organizations is to prevent erosion of their
competitive knowledge base through leakage. Our review of the literature highlights the …

Softmark: software watermarking via a binary function relocation

H Kang, Y Kwon, S Lee, H Koo - … of the 37th Annual Computer Security …, 2021 - dl.acm.org
The ease of reproducibility of digital artifacts raises a growing concern in copyright
infringement; in particular, for a software product. Software watermarking is one of the …

Hindering data theft with encrypted data trees

J Blasco, JE Tapiador, P Peris-Lopez… - Journal of Systems and …, 2015 - Elsevier
Data theft is a major threat for modern organizations with potentially large economic
consequences. Although these attacks may well originate outside an organization's …

An information security risk management model for smart industries

N Sohrabi Safa, C Maple… - Advances in Manufacturing …, 2017 - ebooks.iospress.nl
Abstract Internet of Things (IoT) has been acknowledged as a new revolution in technology.
IoT play an important role in the flourishing of smart manufacturing and in supply chains …

Quantification of side-channel information leaks based on data complexity measures for web browsing

ZM He, PPK Chan, DS Yeung, W Pedrycz… - International Journal of …, 2015 - Springer
Website fingerprinting attack can identify the visited websites by analyzing the side-channel
information of the network traffic even though it is transferred through an encrypted tunnel …

[PDF][PDF] Automating interpretations of trustworthiness

M Sel - 2021 - core.ac.uk
Digital services have a significant impact on the lives of many individuals and organisations.
Trust influences decisions regarding potential service providers, and continues to do so …

APT kaynaklı ataklara karşı dayanıklı etmen tabanlı ve ontolojik veri sızıntısı önleme sistemi= Agent based and ontological data leakage prevention system against …

E Kaya - 2024 - acikerisim.sakarya.edu.tr
Gelişmiş Israrcı Tehditler (Advanced Persistent Threat-APT) tarafından gerçekleştirilen veri
sızıntıları kurumlar ve devletler için her geçen gün artan bir sorun olmaktadır. Yapılan …