Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
policy-based governance
biblio
Context-aware graph-based analysis for detecting anomalous activities
Submitted by grigby1 on Tue, 12/12/2017 - 12:24pm
pubcrawl
Insider Threats
maximum flow algorithm
Metrics
multimodal resources
optimisation
optimization
Organizations
policy-based governance
insider threat
query-adaptive graph-based optimization approach
Reliability
Resiliency
Support vector machines
time-dependent data
ubiquitous computing
user model mutual similarity
user profile analysis
context-dependent anomaly type
anomalous activity detection
anomalous user activity identification
Anomaly Detection
anomaly localization
anomaly occurrence
collaboration
Complexity theory
context-aware graph-based analysis
Activity Recognition
data analysis
Electronic mail
exhaustive identification
gesture recognition
graph analysis
graph theory
Human behavior
Human Factors
biblio
Scenarios using situation awareness in a simulation environment for eliciting insider threat behavior
Submitted by grigby1 on Tue, 12/12/2017 - 12:24pm
Insider Threats
usability
Stress
Situation Awareness
simulation environment
simulation
security of data
Resiliency
pubcrawl
policy-based governance
Particle measurements
Metrics
IT behavior
active indicators
insider threat behavior
insider threat
Human Factors
Human behavior
Government
gaze tracking
Decision support systems
deception
Cybersecurity
collaboration
Atmospheric measurements
AI
biblio
Insider Threats and Cryptographic Techniques in Secure Information Management
Submitted by grigby1 on Tue, 12/12/2017 - 12:24pm
Human behavior
unauthorized leakage
strategic data splitting
semantic analysis
secure information management
Resiliency
pubcrawl
Protocols
policy-based governance
Metrics
Insider Threats
information management security
information management
Human Factors
authorisation
enterprise management processes
Economics
data reconstruction methods
Data protection
data analysis
Cryptography
Cryptographic Protocols
cryptographic data splitting algorithms
Companies
collaboration
cognitive systems
cognitive data analysis
business data processing
biblio
Modeling insider threat types in cyber organizations
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Insider Threats
trust
susceptibility
social modeling
security of data
Resiliency
Random variables
pubcrawl
Predictive models
predictability
policy-based governance
Organizations
Metrics
manipulation
knowledge based systems
insider traits
Awareness
insider threat types
insider threat
Human Factors
Human behavior
cyber security
cyber organizations
cultural differences
Computational modeling
computational model
collaboration
business data processing
Behavioral Modeling
Bayesian knowledge bases (BKBs)
Bayes methods
biblio
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Resiliency
intellectual property theft
Intrusion Detection Systems
Metrics
organisational aspects
Organizations
policy-based governance
psychology
pubcrawl
intellectual property
role-based profile assessment
sensitive organizational data access
synthetic data-driven scenarios
tree data structures
tree-structure profiling
User behavior
user profile assessment
visual analytics tools
data analysis
authorisation
authorized data access
automated insider threat detection system
business data processing
business reputation
collaboration
computer security
cyber security
Anomaly Detection
data visualisation
Electronic mail
feature extraction
financial theft
Human behavior
Human Factors
insider threat
Insider Threats
biblio
On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC)
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
motivation detection
Insider Threats
intellectual property
intent authentication
intent-based access control
intention detection
involuntary electroencephalogram reactions
malicious insiders
Metrics
insider threat prevention
nonidentity-based authentication
P300
physiology
policy-based governance
pubcrawl
Resiliency
Terrorism
Human behavior
Accuracy
authentication
authorisation
brain signals
collaboration
electroencephalogram (EEG)
electroencephalography
event-related potential (ERP)
Access Control
Human Factors
IBAC
identity enrolment
identity recognition
industrial property
information technology
insider threat
biblio
Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharing
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
pubcrawl
Learning systems
local-outlier factor
LOF
machine learning algorithms
Metrics
OddBall
pagerank
Peer-to-peer computing
policy-based governance
Insider Threats
relationship graphs
Resiliency
security of data
Time series analysis
two-stage machine learning system
Unsupervised Learning
wavelet analysis
wavelet coefficients
graph theory
cloud file-sharing
cloud file-sharing services
collaboration
Company Data
company IP
discrete wavelet transform
discrete wavelet transforms
DWT
Cloud Computing
graph-based unsupervised learning
graph-based unsupervised machine learning methods
Haar transforms
Haar wavelet
Haar wavelet function
Human behavior
Human Factors
Insider Threat Detection
biblio
Insider Threat Detection Through Attributed Graph Clustering
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Insider Threats
trusted source
security of data
security
Resiliency
pubcrawl
psychology
policy-based governance
pattern clustering
outlier ranking mechanism
Organizations
organizational dynamics
network analysis
Metrics
malicious insider access
malicious attacker unpredictability
Anomaly Detection
Insider Threat Detection
Human Factors
Human behavior
heterogeneous data analysis
graph theory
enterprise users
Electronic mail
data analysis
cybersecurity threats
collaboration
Clustering algorithms
business data processing
Bipartite graph
attributed graph clustering
biblio
Critical Analysis in the Research Area of Insider Threats
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Insider Threats
unintentional internal information security violation
taxonomy
Stress
Resiliency
pubcrawl
psychology
policy-based governance
Organizations
Monitoring
Metrics
Analytical models
insider threat modelling
insider espionage
insider behavior forecasting
Information systems
information security
Human Factors
Human behavior
detection of potential insiders
cyber sabotage
collaboration
biblio
Insider Threat Detection Based on Deep Belief Network Feature Representation
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Insider Threat Detection
Training
Resiliency
pubcrawl
Postal services
policy-based governance
one-class SVM
Metrics
Learning systems
Insider Threats
collaboration
Information systems
Human Factors
Human behavior
feature representation
feature extraction
Electronic mail
Deep Belief Network
Data models
« first
‹ previous
…
97
98
99
100
101
102
103
104
105
next ›
last »