Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
insider threat
biblio
Insider Threat Mitigation Using Moving Target Defense and Deception
Submitted by grigby1 on Tue, 01/16/2018 - 5:31pm
threat mitigation
attribute-based access control
deception
insider threat
Metrics
moving target defense
pubcrawl
Resiliency
biblio
Context-aware graph-based analysis for detecting anomalous activities
Submitted by grigby1 on Tue, 12/12/2017 - 12:24pm
pubcrawl
Insider Threats
maximum flow algorithm
Metrics
multimodal resources
optimisation
optimization
Organizations
policy-based governance
insider threat
query-adaptive graph-based optimization approach
Reliability
Resiliency
Support vector machines
time-dependent data
ubiquitous computing
user model mutual similarity
user profile analysis
context-dependent anomaly type
anomalous activity detection
anomalous user activity identification
Anomaly Detection
anomaly localization
anomaly occurrence
collaboration
Complexity theory
context-aware graph-based analysis
Activity Recognition
data analysis
Electronic mail
exhaustive identification
gesture recognition
graph analysis
graph theory
Human behavior
Human Factors
biblio
Scenarios using situation awareness in a simulation environment for eliciting insider threat behavior
Submitted by grigby1 on Tue, 12/12/2017 - 12:24pm
Insider Threats
usability
Stress
Situation Awareness
simulation environment
simulation
security of data
Resiliency
pubcrawl
policy-based governance
Particle measurements
Metrics
IT behavior
active indicators
insider threat behavior
insider threat
Human Factors
Human behavior
Government
gaze tracking
Decision support systems
deception
Cybersecurity
collaboration
Atmospheric measurements
AI
biblio
Modeling insider threat types in cyber organizations
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Insider Threats
trust
susceptibility
social modeling
security of data
Resiliency
Random variables
pubcrawl
Predictive models
predictability
policy-based governance
Organizations
Metrics
manipulation
knowledge based systems
insider traits
Awareness
insider threat types
insider threat
Human Factors
Human behavior
cyber security
cyber organizations
cultural differences
Computational modeling
computational model
collaboration
business data processing
Behavioral Modeling
Bayesian knowledge bases (BKBs)
Bayes methods
biblio
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Resiliency
intellectual property theft
Intrusion Detection Systems
Metrics
organisational aspects
Organizations
policy-based governance
psychology
pubcrawl
intellectual property
role-based profile assessment
sensitive organizational data access
synthetic data-driven scenarios
tree data structures
tree-structure profiling
User behavior
user profile assessment
visual analytics tools
data analysis
authorisation
authorized data access
automated insider threat detection system
business data processing
business reputation
collaboration
computer security
cyber security
Anomaly Detection
data visualisation
Electronic mail
feature extraction
financial theft
Human behavior
Human Factors
insider threat
Insider Threats
biblio
On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC)
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
motivation detection
Insider Threats
intellectual property
intent authentication
intent-based access control
intention detection
involuntary electroencephalogram reactions
malicious insiders
Metrics
insider threat prevention
nonidentity-based authentication
P300
physiology
policy-based governance
pubcrawl
Resiliency
Terrorism
Human behavior
Accuracy
authentication
authorisation
brain signals
collaboration
electroencephalogram (EEG)
electroencephalography
event-related potential (ERP)
Access Control
Human Factors
IBAC
identity enrolment
identity recognition
industrial property
information technology
insider threat
biblio
A Tripwire Grammar for Insider Threat Detection
Submitted by grigby1 on Fri, 10/27/2017 - 11:10am
Metrics
pubcrawl
Resiliency
Human behavior
Scalability
attack-pattern
Grammar
insider threat
security policies
tripwire
threat mitigation
file
Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs
Submitted by thurlwel on Fri, 09/01/2017 - 1:21pm
insider threat
Intrusion Detection
physical access
Physical movement
Science of Security
User behavior
Hard Problems
biblio
Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs
Submitted by thurlwel on Fri, 09/01/2017 - 1:21pm
Science of Security
cyber-physical systems
insider threat
Intrusion Detection
physical access
Physical movement
Science of Security
User behavior
biblio
A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems
Submitted by grigby1 on Tue, 08/22/2017 - 10:47am
collaboration
complex ICT systems
graph theory
Human behavior
Human Factors
insider threat
Metrics
pubcrawl
Resiliency
risk assessment
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »