Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Insider Threat Detection
biblio
An Insider Threat Detection Method Based on Heterogeneous Graph Embedding
Submitted by grigby1 on Fri, 08/25/2023 - 2:42pm
resilience
ITDD Model
Heterogeneous Graph of employees' logs
Behavioral sciences
Resiliency
graph embedding
Policy Based Governance
Big Data
Computational modeling
Data models
Conferences
insider threat
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
machine learning
feature extraction
biblio
An Analysis of Insider Attack Detection Using Machine Learning Algorithms
Submitted by grigby1 on Fri, 08/25/2023 - 2:41pm
policy-based governance
Resiliency
classification
Measurement
Policy Based Governance
computer security
Wireless communication
Data models
security
resilience
insider threat
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
machine learning algorithms
machine learning
Predictive models
biblio
A Framework to Detect the Malicious Insider Threat in Cloud Environment using Supervised Learning Methods
Submitted by grigby1 on Fri, 08/25/2023 - 2:41pm
Metrics
behavioral model
Resiliency
supervised learning
OCSVM
Data integration
Measurement
Policy Based Governance
Computational modeling
resilience
policy-based governance
deep learning
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
Anomaly Detection
Support vector machines
Organizations
machine learning
insider threat
biblio
Personalized User Profiles-based Insider Threat Detection for Distributed File System
Submitted by grigby1 on Fri, 07/21/2023 - 1:16pm
Data Security
User profile
distributed file system
false trust
Resiliency
HDFS
File systems
Clustering algorithms
resilience
Measurement
Insider Threat Detection
estimation
Industries
authorization
Scalability
collaboration
policy-based governance
pubcrawl
machine learning
biblio
Insider Threat Detection Based on User Historical Behavior and Attention Mechanism
Submitted by grigby1 on Tue, 06/07/2022 - 10:08am
Recurrent neural networks
insider threat
data science
attention mechanism
Cyberspace
Metrics
Data mining
composability
History
Organizations
Conferences
policy-based governance
Human behavior
pubcrawl
Neural networks
Insider Threat Detection
Anomaly Detection
biblio
Insider Threat Detection Using An Unsupervised Learning Method: COPOD
Submitted by grigby1 on Tue, 06/07/2022 - 10:07am
Human behavior
tree structure analysis
insider threat
Vegetation
Metrics
composability
Companies
Communication networks
policy-based governance
feature extraction
pubcrawl
Intrusion Detection
Insider Threat Detection
Anomaly Detection
Unsupervised Learning
Forestry
security
biblio
Insider Threat Detection using an Artificial Immune system Algorithm
Submitted by grigby1 on Thu, 04/08/2021 - 3:56pm
malicious insiders
NSA
negative selection algorithms
negative selection algorithm
insider threat activities
computer emergency response team synthetic insider threat dataset
CERT
artificial immune systems
artificial immune system algorithm
Ensemble
anomaly detection system
malicious insider
legitimate users
learning (artificial intelligence)
Metrics
pattern classification
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Anomaly Detection
Insider Threat Detection
insider threat
security of data
biblio
Insider Threat Identification System Model Based on Rough Set Dimensionality Reduction
Submitted by grigby1 on Thu, 04/08/2021 - 3:55pm
Metrics
rough set dimensionality reduction
rough set
minimum risk Bayes decision
insider threat identification system model
impersonation detection
feedback tree
demensionality reduction
Bayes network
attribute information database
set theory
rough set theory
Accuracy
Bayes methods
User behavior
probability
insider threat
trees (mathematics)
Classification algorithms
information system security
Information systems
Identification
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threat Detection
security
Training
security of data
biblio
Insider Threat Detection with Face Recognition and KNN User Classification
Submitted by grigby1 on Thu, 04/08/2021 - 3:53pm
image authenticity
face recognition
authentication mechanism
Face
security concerns
Facial features
cloud insider
Cloud Penetration
cloud user community
Degree of Trust
factor authentication
nearest neighbour methods
kNN classification algorithm
KNN Classification and QoS
KNN user Classification
private cloud deployments
Security Method
threat detection model
Threat detection module
threat detection QoS
insider threat
policy-based governance
authorisation
Cloud Computing
information security
Insider Threat Detection
machine learning
Monitoring
Insider Threats
pubcrawl
Human behavior
security of data
resilience
Resiliency
message authentication
authentication
quality of service
cloud storage
pattern classification
sensitive information
Metrics
biblio
Insider Threat Detection Using Natural Language Processing and Personality Profiles
Submitted by aekwall on Mon, 02/22/2021 - 12:39pm
Linguistics
third-party cloud service
psychological profiles
proof-of-concept detection system
personality profiles
personality insights
personal content
Insider Threats
taxonomy
psychology
Insider Threat Detection
natural language processing
computer security
Companies
pubcrawl
Human behavior
Resiliency
Scalability
Cloud Computing
security of data
1
2
next ›
last »