Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
insider threat
biblio
Insider Threat Detection using an Artificial Immune system Algorithm
Submitted by grigby1 on Thu, 04/08/2021 - 3:56pm
malicious insiders
NSA
negative selection algorithms
negative selection algorithm
insider threat activities
computer emergency response team synthetic insider threat dataset
CERT
artificial immune systems
artificial immune system algorithm
Ensemble
anomaly detection system
malicious insider
legitimate users
learning (artificial intelligence)
Metrics
pattern classification
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Anomaly Detection
Insider Threat Detection
insider threat
security of data
biblio
Insider Threat Identification System Model Based on Rough Set Dimensionality Reduction
Submitted by grigby1 on Thu, 04/08/2021 - 3:55pm
Metrics
rough set dimensionality reduction
rough set
minimum risk Bayes decision
insider threat identification system model
impersonation detection
feedback tree
demensionality reduction
Bayes network
attribute information database
set theory
rough set theory
Accuracy
Bayes methods
User behavior
probability
insider threat
trees (mathematics)
Classification algorithms
information system security
Information systems
Identification
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threat Detection
security
Training
security of data
biblio
A Mobile Edge Mitigation Model for Insider Threats: A Knowledgebase Approach
Submitted by grigby1 on Thu, 04/08/2021 - 3:55pm
Cloud Security
Organizations
mobile edge mitigation model
mobile edge computing mitigation model
Mobile Edge
knowledgebase approach
insider threat problem
dependency
database
cloud users
cloud internal users
insider threat
malicious insiders
malicious outsiders
cloud
security of data
Metrics
knowledge based systems
mobile computing
Cloud Computing
private data
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threats
Knowledgebase
biblio
Modeling of Insider Threat using Enterprise Automaton
Submitted by grigby1 on Thu, 04/08/2021 - 3:55pm
automata
psycho-social behaviors
novel unified model
nonhuman agents
insider threat modeling
insider attacker
insider agents
insider
Enterprise process
enterprise automaton
authorized privileges
security management
Silicon
Task Analysis
Metrics
authorisation
Attack detection
Computational modeling
privacy issues
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
business data processing
security
Organizations
insider threat
biblio
An Active Defense Model and Framework of Insider Threats Detection and Sense
Submitted by grigby1 on Thu, 04/08/2021 - 3:54pm
computer networks
Systems engineering education
SEnSE
insider threats detection
insider threat sense
hierarchy-mapping based insider threats model
Fellows
Electronic equipment
active defense model
Systems engineering and theory
detection
model
computer science education
insider threat
Metrics
computer security
Information systems
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Monitoring
information security
security of data
biblio
Navigating the Insider Threat Tool Landscape: Low Cost Technical Solutions to Jump Start an Insider Threat Program
Submitted by grigby1 on Thu, 04/08/2021 - 3:54pm
Resiliency
low-cost technical solutions
insider threat control deployment
insider risk mitigation
high-level categories
insider threat program
risk analysis
Metrics
Law
Software
tools
resilience
policy-based governance
Human behavior
pubcrawl
Monitoring
security
Organizations
insider threat
security of data
biblio
Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions
Submitted by grigby1 on Thu, 04/08/2021 - 3:54pm
ontologies (artificial intelligence)
Taxonomies
OWL
insider threat research
insider threat definitions
insider
definitions
conceptual model
Educational institutions
software engineering
Ontology
taxonomy
insider threat
Ontologies
Metrics
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
security
Organizations
security of data
biblio
Insider Threat Detection with Face Recognition and KNN User Classification
Submitted by grigby1 on Thu, 04/08/2021 - 3:53pm
image authenticity
face recognition
authentication mechanism
Face
security concerns
Facial features
cloud insider
Cloud Penetration
cloud user community
Degree of Trust
factor authentication
nearest neighbour methods
kNN classification algorithm
KNN Classification and QoS
KNN user Classification
private cloud deployments
Security Method
threat detection model
Threat detection module
threat detection QoS
insider threat
policy-based governance
authorisation
Cloud Computing
information security
Insider Threat Detection
machine learning
Monitoring
Insider Threats
pubcrawl
Human behavior
security of data
resilience
Resiliency
message authentication
authentication
quality of service
cloud storage
pattern classification
sensitive information
Metrics
biblio
Identifying indicators of insider threats: Insider IT sabotage
Submitted by grigby1 on Thu, 04/08/2021 - 3:53pm
software engineering
software installation
Sociotechnical
sabotage
Materials
insider threats indicators
insider threat cases
insider IT sabotage
indicators
Educational institutions
chronological timelines
attack planning
Weapons
insider threat
Metrics
information technology
Databases
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
security
Organizations
security of data
biblio
Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model
Submitted by grigby1 on Fri, 08/07/2020 - 2:38pm
resilience
insider threat
invasive software
malware
Mathematical model
Metrics
modified SEIQV model
Patching
pubcrawl
Immune system
Resiliency
SEIQP model
SEIQV
susceptible-exposed-infected-quarantined-patched model
susceptible-exposed-infected-quarantined-vaccinated model
Worm
worm propagation modeling
computer network security
air-gapped network
anti-virus
Atmospheric modeling
Biological system modeling
biologically based epidemic models
Communication networks
composability
Computational modeling
Air gaps
computer networks
Computer worms
differential equations
Epidemic model
Grippers
Human behavior
Human Factors
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »