Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
insider threat
biblio
Endpoint Protection: Measuring the Effectiveness of Remediation Technologies and Methodologies for Insider Threat
Submitted by grigby1 on Tue, 01/21/2020 - 10:22am
Resiliency
resilience
pubcrawl
privacy
policy-based governance
Metrics
insider threat
Human behavior
Endpoint protection platform
Endpoint protection
Endpoint detection and response
data leakage
Data Breach
collaboration
biblio
Cloud Computing: A Paradigm of More Insider Threats
Submitted by grigby1 on Tue, 01/21/2020 - 10:22am
Resiliency
resilience
pubcrawl
policy-based governance
outsource
organization
Metrics
insider threat
insider
Human behavior
detection
collaboration
Cloud Computing
biblio
A Trust Aware Unsupervised Learning Approach for Insider Threat Detection
Submitted by grigby1 on Tue, 01/21/2020 - 10:22am
machine learning
Unsupervised Learning
trust aware unsupervised learning
trust
system logs
Support vector machines
Resiliency
resilience
pubcrawl
policy-based governance
Organizations
one-class SVM
Metrics
machine learning algorithms
threat mitigation
isolation forest
insiders
insider threat detection systems
insider threat
Human behavior
Forestry
feature extraction
Data mining
data analysis
collaboration
CERT insider threat dataset
Anomaly Detection
biblio
A Framework for Data-Driven Physical Security and Insider Threat Detection
Submitted by aekwall on Mon, 08/26/2019 - 9:07am
pubcrawl
organizational security policies
Organizations
physical security
physical security architecture
Physical Security Definition
policy-based governance
provenance graphs
PSO
ontologies (artificial intelligence)
resilience
risk management
rule-based anomaly detection
security of data
Security Ontology
Security Provenance
security provenance solution
security weaknesses
Human behavior
Anomaly Detection
Attack Pattern Reconstruction
data analysis
Data Analytics
data-driven physical security
Digital Forensics
forensic data analysis
Forensics
Access Control
insider threat
Insider Threat Detection
insider threats mitigation
intrusion attempts
Metrics
ontological framework
Ontologies
biblio
Deep Learning Based Attribute Classification Insider Threat Detection for Data Security
Submitted by aekwall on Wed, 05/08/2019 - 8:49am
long short term memory recurrent neural networks
threat detection recall
security of data
resilience
Recurrent neural networks
recurrent neural nets
pubcrawl
Principal Component Analysis based threat detection methods
principal component analysis
pattern classification
network threat
Metrics
malicious insiders
machine learning
Anomaly Detection
Logic gates
learning (artificial intelligence)
Kernel
insider threat
Human behavior
high detection rate
feature extraction
end-to-end detection framework
deep learning
Data Security
CERT insider threat dataset
attribute classifiers
attribute classification insider threat detection method
biblio
Mystique: Uncovering Information Leakage from Browser Extensions
Submitted by aekwall on Wed, 05/08/2019 - 8:49am
taint analysis
JavaScript
Information Flow
browser extensions
resilience
privacy
insider threat
Metrics
pubcrawl
Human behavior
biblio
Benchmarking Evolutionary Computation Approaches to Insider Threat Detection
Submitted by aekwall on Wed, 05/08/2019 - 8:49am
resilience
insider threat
Metrics
pubcrawl
Human behavior
Insider Threat Detection
Cyber-security
biblio
Balancing Organizational Incentives to Counter Insider Threat
Submitted by aekwall on Wed, 05/08/2019 - 8:47am
positive incentives
negative incentives
organisational aspects
organizational aspects
organizational context
organizational supportiveness
Organizations
perceived organizational support
Personnel
Monitoring
psychology
pubcrawl
resilience
security of data
sociotechnical systems
software engineering
traditional security practices
workforce management practices
Engagement
balanced combination
balances organizational incentives
balancing organizational incentives
best practices
computer security
contracts
dysfunctional management practices
employee welfare
authorisation
Human behavior
human resources management
insider threat
insider threat program
insider wrongdoing
Metrics
missing dimension
biblio
Towards a data-driven behavioral approach to prediction of insider-threat
Submitted by aekwall on Wed, 05/08/2019 - 8:47am
Linguistics
Task Analysis
security of data
resilience
pubcrawl
psychology
post-hoc personality analysis
personality vulnerabilities
personality variables
personality differences
Particle measurements
Organizations
Metrics
Atmospheric measurements
learning (artificial intelligence)
insider-threat related behavior
Insider Threats
Insider Threat Detection
insider threat
industrial property
Human behavior
Games
Game-based Approach
data-driven behavioral approach
behavioral analysis
biblio
A Framework for Insider Collusion Threat Prediction and Mitigation in Relational Databases
Submitted by aekwall on Wed, 05/08/2019 - 8:47am
insider threat
robust technique
Resiliency
resilience
remuneration
relational databases
relational database systems
relational database security
Relational Database
real time monitoring technique
pubcrawl
Predictive models
mitigating technique
Metrics
Knowledgebase
insiders accesses
threat mitigation
insider collusion threat prediction
information security
Human behavior
discovered collusion insider threat
database schema
database management systems
database architect
Data dependencies
Computer hacking
composability
Collusion Threat
collusion insider attacks
collaboration
Cloud Computing
authorisation
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »