Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
insider threat
biblio
Cybercrime Countermeasure of Insider Threat Investigation
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
DPI method
Scalability
Resiliency
resilience
pubcrawl
Organizations
Online banking
law enforcement
Inspection
insider threat investigation
insider threat
Big Data
digital investigation process
digital evidence
deep packet inspection methods
deep packet inspection
cybercrime threats
cybercrime investigation
cybercrime insider investigation
cybercrime countermeasure
Computer crime
biblio
Insider Threats: It's the HUMAN, Stupid!
Submitted by grigby1 on Tue, 01/21/2020 - 11:32am
Behavioral Monitoring
collaboration
composability
counterintelligence
Human behavior
Information Assurance
insider threat
Insider Threat Ontology
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
Sociotechnical Indicators
biblio
Insider Threat Detection Based on Adaptive Optimization DBN by Grid Search
Submitted by grigby1 on Tue, 01/21/2020 - 11:25am
learning rate
two-dimensional grid
Training
threat detection rate
security of data
search problems
Resiliency
resilience
pubcrawl
policy-based governance
optimization parameters
Optimization methods
one-dimensional parameter optimization
network structure
Metrics
insider threat
learning (artificial intelligence)
insider threat detection method
Human behavior
grid search
deep learning model
deep learning
deep belief net
composability
collaboration
belief networks
adaptive systems
adaptive optimization DBN
adaptive optimization
Adaptation models
biblio
User Behavior Profiling Using Ensemble Approach for Insider Threat Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:24am
resilience
Monitoring
MSLSTM
multistate long short term memory
multistate LSTM
network walls
Neural networks
Organizations
policy-based governance
pubcrawl
Metrics
Resiliency
security of data
Servers
spatial-temporal behavior features
time series
Time Series Anomaly Detection
user behavior action sequence
user behavior profiling
ensemble hybrid machine learning
behavioural sciences computing
CNN
collaboration
convolution
convolution neural network
convolution neural networks
convolutional neural nets
cyber security
Anomaly Detection
feature extraction
Human behavior
human behavior impact
insider threat
Insider Threat Detection
learning (artificial intelligence)
machine learning
malicious activities
biblio
The Location-Centric Approach to Employee's Interaction Pattern Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:24am
Insider Threat Detection
Access Control
access control system
authorisation
business data processing
business processes
collaboration
data analysis
Data mining
data visualisation
Data visualization
employee interaction pattern detection
Human behavior
information security
insider threat
visualization-driven technique
location-centric approach
location-centric bevavior patterns
Metrics
Organizations
Personnel
policy-based governance
pubcrawl
resilience
Resiliency
security policies
sensors
step charts
Task Analysis
biblio
Machine Learning Based Insider Threat Modelling and Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
machine learning
user-centered machine learning
security of data
security
Resiliency
resilience
pubcrawl
policy-based governance
Organizations
multiple data granularity levels
Metrics
malicious insider attacks
machine learning algorithms
Cyber-security
Logistics
learning (artificial intelligence)
insider threat modelling
insider threat detection system
insider threat
insider scenario specific results
Human behavior
feature extraction
Data collection
damaging threats
collaboration
biblio
On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
Intrusion Detection Systems
blockchain
blockchain architectures
CIDN peers
collaboration
collaborative IDS nodes
collaborative intrusion detection
collaborative intrusion detection networks
Cryptography
Distributed databases
distributed ledger technologies
Human behavior
insider attacks
insider threat
Insider Threats
Intrusion Detection
Trusted Computing
IP networks
Metrics
Monitoring
Peer-to-peer computing
policy-based governance
pubcrawl
resilience
Resiliency
security
tampered-resistant trust-chain
Trust management
trust management issues
trust-based blockchain
trust-based collaborative intrusion detection
biblio
Information Security Policy Perceived Compliance Among Staff in Palestine Universities: An Empirical Pilot Study
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
planned behaviour theory
Instruments
ISP
Least squares approximations
Mathematical model
Metrics
organisational aspects
Palestine university staffs
partial least squares structural equation modelling
Personnel
insider threat
PLS-SEM
policy-based governance
protection motivation theory
pubcrawl
resilience
Resiliency
security of data
statistical analysis
General Deterrence Theory
appraisal
Bibliographies
collaboration
Communications technology
compliance behaviour
data collection method
Educational institutions
employees
Security Policies Analysis
government policies
Human behavior
Human Factors
information reinforcement theory
information security
information security policy
Information Security Policy Awareness
information security risks mitigation
biblio
A Symptomatic Framework to Predict the Risk of Insider Threats
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
Insider Threat Scoring Engine (ITSE)
collaboration
Critical assets
critical infrastructure
critical infrastructure organisation
critical infrastructures
Engines
Human behavior
information security
information security threats
insider threat
insider threat events
insider threat framework for Namibia critical infrastructure organization
tools
Interviews
ITFNACIO
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
risk management
security of data
symptomatic analysis
Symptomatic Analysis (SA)
symptomatic insider threat risk assessment framework
biblio
Removing Personally Identifiable Information from Shared Dataset for Keystroke Authentication Research
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
policy-based governance
keystroke dataset
keystroke dynamics
message authentication
Metrics
password
personally identifiable information
personally sensitive information
PII detection program
keystroke authentication research
privacy removal
pubcrawl
resilience
Resiliency
social security numbers
Task Analysis
text analysis
user authentication systems
Electronic mail
authentication
authorisation
bank card numbers
biometrics (access control)
collaboration
Continuous Authentication
conventional authentication methods
data privacy
arrays
free-text authentication algorithm
free-text keystroke authentication
Human behavior
identity theft
insider threat
Insider Threats
keystroke analysis
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »