[1]
|
Insider Threats: Detecting and Controlling Malicious Insiders
|
|
NULL |
|
|
[2]
|
PRI: Privacy Preserving Inspection of Network Traffic
|
|
NULL |
|
|
[3]
|
ENHANCED HIDDEN MARKOV MODELS (HMMs) FOR REAL-TIME FRAUD DETECTION IN ELECTRONIC BANKING
|
|
2022 |
|
|
[4]
|
Assessing Insider Threat Intentions: A Multiple Case Study Using Protection Motivation Theory
|
|
2022 |
|
|
[5]
|
ASSESSING PRACTICE OF INFORMATION TECHNOLOGY AUDIT AND FRAUD DETECTION ON COMMERCIAL BANKS IN ETHIOPIA
|
|
2021 |
|
|
[6]
|
Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
|
|
2020 |
|
|
[7]
|
Future Insider Threats: A Delphi Analysis
|
|
2019 |
|
|
[8]
|
A Case Study: Factors that Influence Well-Meaning Insiders' Perception, Judgment, and Actions Related to Information Security
|
|
2019 |
|
|
[9]
|
Advanced Methods to Detect Intricate Cybersecurity Exploits: An Exploratory Qualitative Inquiry
|
|
2019 |
|
|
[10]
|
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
|
|
ProQuest Dissertations Publishing,
2018 |
|
|
[11]
|
AnyThreat: An Opportunistic Knowledge Discovery Approach to Insider Threat Detection
|
|
2018 |
|
|
[12]
|
Workplace Monitoring and Its Effects on Leadership Perceptions of Employee Productivity in Higher Education: An Exploratory Inquiry
|
|
2018 |
|
|
[13]
|
Opportunistic machine learning methods for effective insider threat detection
|
|
2018 |
|
|
[14]
|
A Technical Solution to Insider Threat Prevention
|
|
2017 |
|
|
[15]
|
The Persistent Insider Threat: Is Enough Being Done?
|
|
ISACA Journal,
2017 |
|
|
[16]
|
Defending against malicious insiders: a conceptual framework for predicting, detecting, and deterring malicious insiders
|
|
International Journal of Business Process Integration and Management,
2017 |
|
|
[17]
|
DISCOVERING NEW CYBER PROTECTION APPROACHES FROM ASecurity PROFESSIONAL PROSPECTIVE
|
|
International Journal of Computer Networks & Communications,
2017 |
|
|
[18]
|
Cybersecurity Policy: Exploring Leadership Strategies that Influence Insider Compliance
|
|
ProQuest Dissertations Publishing,
2017 |
|
|
[19]
|
Discovering new cyber protection approaches from a security professional prospective
|
|
2017 |
|
|
[20]
|
Outlier Detection in Random Subspaces over Data Streams: An Approach for Insider Threat Detection
|
|
2017 |
|
|
[21]
|
PRI: Privacy Preserving Inspection of Encrypted Network Traffic
|
|
arXiv preprint arXiv:1604.04465,
2016 |
|
|
[22]
|
Latency in intrusion detection systems (IDS) and cyber-attacks: A quantitative comparative study
|
|
2016 |
|
|
[23]
|
Student Information Security Behaviors and Attitudes at a Private Liberal Arts University in the Southeastern United States
|
|
ProQuest Dissertations Publishing,
2016 |
|
|
[24]
|
Data breaches: Confidential data loss by organizations through security vulnerabilities
|
|
ProQuest Dissertations Publishing,
2015 |
|
|
[25]
|
Insider Threats: Detecting and Controlling
|
|
New Threats and Countermeasures in Digital Crime and Cyber Terrorism,
2015 |
|
|
[26]
|
The Trusted Shadow and Trojan Horse of the United States Government
|
|
Journal Article| March,
2014 |
|
|
[27]
|
Financial System Analysis and Research of OLAP and Data Warehouse Technology
|
|
Information Technology Journal,
2014 |
|
|
[28]
|
Protecting and Preserving Mechanisms of DBMS against Insider Threat
|
|
MV Jawalge, E Schallehn, MSS Barthel - wwwiti.cs.uni-magdeburg.de,
2013 |
|
|