Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"A Multi-Leveled Approach to Intrusion Detection and the Insider Threat"
written by Rita M. Barrios,
published by Journal of Information Security, Vol.4 No.1, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Insider Threats: Detecting and Controlling Malicious Insiders
[2] PRI: Privacy Preserving Inspection of Network Traffic
[3] Insider Threat: A Constant Problem with a Continuous Approach
2023
[4] Internal Security threats in Information System-threat protection at all stages of the chain
UBT Knowledge Center, 2022
[5] ENHANCED HIDDEN MARKOV MODELS (HMMs) FOR REAL-TIME FRAUD DETECTION IN ELECTRONIC BANKING
2022
[6] Assessing Insider Threat Intentions: A Multiple Case Study Using Protection Motivation Theory
2022
[7] ASSESSING PRACTICE OF INFORMATION TECHNOLOGY AUDIT AND FRAUD DETECTION ON COMMERCIAL BANKS IN ETHIOPIA
2021
[8] Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
2020
[9] Future Insider Threats: A Delphi Analysis
2019
[10] A Case Study: Factors that Influence Well-Meaning Insiders' Perception, Judgment, and Actions Related to Information Security
2019
[11] Advanced Methods to Detect Intricate Cybersecurity Exploits: An Exploratory Qualitative Inquiry
2019
[12] Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
ProQuest Dissertations Publishing, 2018
[13] AnyThreat: An Opportunistic Knowledge Discovery Approach to Insider Threat Detection
2018
[14] Workplace Monitoring and Its Effects on Leadership Perceptions of Employee Productivity in Higher Education: An Exploratory Inquiry
2018
[15] Opportunistic machine learning methods for effective insider threat detection
2018
[16] A Technical Solution to Insider Threat Prevention
2017
[17] The Persistent Insider Threat: Is Enough Being Done?
ISACA Journal, 2017
[18] Defending against malicious insiders: a conceptual framework for predicting, detecting, and deterring malicious insiders
International Journal of Business Process Integration and Management, 2017
[19] DISCOVERING NEW CYBER PROTECTION APPROACHES FROM ASecurity PROFESSIONAL PROSPECTIVE
International Journal of Computer Networks & Communications, 2017
[20] Cybersecurity Policy: Exploring Leadership Strategies that Influence Insider Compliance
ProQuest Dissertations Publishing, 2017
[21] Discovering new cyber protection approaches from a security professional prospective
2017
[22] Outlier Detection in Random Subspaces over Data Streams: An Approach for Insider Threat Detection
2017
[23] PRI: Privacy Preserving Inspection of Encrypted Network Traffic
arXiv preprint arXiv:1604.04465, 2016
[24] Latency in intrusion detection systems (IDS) and cyber-attacks: A quantitative comparative study
2016
[25] Student Information Security Behaviors and Attitudes at a Private Liberal Arts University in the Southeastern United States
ProQuest Dissertations Publishing, 2016
[26] Data breaches: Confidential data loss by organizations through security vulnerabilities
ProQuest Dissertations Publishing, 2015
[27] Insider Threats: Detecting and Controlling
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 2015
[28] The Trusted Shadow and Trojan Horse of the United States Government
Journal Article| March, 2014
[29] Financial System Analysis and Research of OLAP and Data Warehouse Technology
Information Technology Journal, 2014
[30] Protecting and Preserving Mechanisms of DBMS against Insider Threat
MV Jawalge, E Schallehn, MSS Barthel - wwwiti.cs.uni-magdeburg.de, 2013
Free SCIRP Newsletters
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top