Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
insider threat
biblio
Compliance Checking Based Detection of Insider Threat in Industrial Control System of Power Utilities
Submitted by grigby1 on Fri, 08/25/2023 - 2:43pm
Industries
remote charge control
compliance check
business process component
Resiliency
power system reliability
Electrical Engineering
Policy Based Governance
control systems
process control
integrated circuits
insider threat
industrial control system
resilience
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
security
biblio
An Insider Threat Detection Method Based on Heterogeneous Graph Embedding
Submitted by grigby1 on Fri, 08/25/2023 - 2:42pm
resilience
ITDD Model
Heterogeneous Graph of employees' logs
Behavioral sciences
Resiliency
graph embedding
Policy Based Governance
Big Data
Computational modeling
Data models
Conferences
insider threat
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
machine learning
feature extraction
biblio
Insider Attack Detection and Prevention using Server Authentication using Elgamal Encryption
Submitted by grigby1 on Fri, 08/25/2023 - 2:42pm
Protocols
Two way authentication
secure authentication
legitimate node
insider attacks
ElGamal encryption
passwords
location awareness
Costs
Resiliency
Elliptic curve cryptography
Policy Based Governance
insider threat
web services
Cryptography
authentication
resilience
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
biblio
An Analysis of Insider Attack Detection Using Machine Learning Algorithms
Submitted by grigby1 on Fri, 08/25/2023 - 2:41pm
policy-based governance
Resiliency
classification
Measurement
Policy Based Governance
computer security
Wireless communication
Data models
security
resilience
insider threat
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
machine learning algorithms
machine learning
Predictive models
biblio
A Framework to Detect the Malicious Insider Threat in Cloud Environment using Supervised Learning Methods
Submitted by grigby1 on Fri, 08/25/2023 - 2:41pm
Metrics
behavioral model
Resiliency
supervised learning
OCSVM
Data integration
Measurement
Policy Based Governance
Computational modeling
resilience
policy-based governance
deep learning
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
Anomaly Detection
Support vector machines
Organizations
machine learning
insider threat
biblio
Insider Threat Data Expansion Research using Hyperledger Fabric
Submitted by grigby1 on Fri, 08/25/2023 - 2:41pm
real-time systems
Insider Threat Dataset
Behavioral sciences
blockchains
Resiliency
Hyperledger Fabric
smart contract
Fabrics
distributed ledger
Policy Based Governance
smart contracts
insider threat
Companies
resilience
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
blockchain
Insider Threats
biblio
Towards a New Taxonomy of Insider Threats
Submitted by grigby1 on Fri, 08/25/2023 - 2:40pm
History
threat sophistication
threat path
taxonomy tree
insider threat agent taxonomy
insider threat agent
Resiliency
Bibliographies
taxonomy
Proposals
Policy Based Governance
insider threat
Object recognition
resilience
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
Organizations
biblio
An Exploratory Study of Security Data Analysis Method for Insider Threat Prevention
Submitted by grigby1 on Fri, 08/25/2023 - 2:40pm
insider threat
security
Insider Threats
pubcrawl
Human behavior
Human Factors
Metrics
policy-based governance
resilience
information and communication technology
convergence
Policy Based Governance
data analysis
Resiliency
Data Analysis Method
Security Data Analysis
biblio
Developing Visualisations to Enhance an Insider Threat Product: A Case Study
Submitted by grigby1 on Tue, 06/07/2022 - 10:09am
Data visualization
Usability in security and privacy
interactive systems
Human and Societal Aspects of Security and Privacy
visual analytics
Visualization application domains
security and privacy
human-centered computing
Refining
insider threat
pubcrawl
visualization
Metrics
composability
Prototypes
privacy
Software
policy-based governance
Human behavior
biblio
Insider Attack: Internal Cyber Attack Detection Using Machine Learning
Submitted by grigby1 on Tue, 06/07/2022 - 10:08am
Prediction algorithms
Randomized Weighted Majority Algorithm (RWMA)
random forest (RF)
insider attack
Fuzzy Membership Function
Data granularity
machine learning (ML)
insider threat
Transforms
parallel processing
machine learning algorithms
Metrics
Decision trees
composability
Radio frequency
policy-based governance
Human behavior
pubcrawl
Neural networks
cyber security
1
2
3
4
5
6
7
8
9
next ›
last »