[PDF][PDF] The trend of the security research for the insider cyber threat

J Hong, J Kim, J Cho - … Journal of Future Generation Communication and …, 2010 - Citeseer
… This study uses network traffic to detect the insider threat. It is similar to a traditional method,
which compares traffic c statistics at each hour. When someone accesses specific internal …

The trend of the security research for the insider cyber threat

J Hong, J Kim, J Cho - Security Technology: International Conference …, 2009 - Springer
… This study uses network traffic to detect the insider threat. It is similar to a traditional method,
which compares traffic statistics at each hour. When someone accesses specific internal data…

Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis

IA Gheyas, AE Abdallah - Big data analytics, 2016 - Springer
… The trend of security research for the insider cyber threat. The x-axis represents ‘Year’
and the y-axis represents the number of publications published in any given year …

Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
… DISCUSSION AND RESEARCH CHALLENGES This section discuss some other aspects
regarding this research of preventing and detecting insider threats and present the research

[HTML][HTML] Insider threat detection in cyber-physical systems: a systematic literature review

MN Al-Mhiqani, T Alsboui, T Al-Shehari… - Computers and …, 2024 - Elsevier
… on Industrial IoT security has leaned heavily towards cyber threats rather … research trends
In this section, we delve into the global landscape of research trends concerning insider threat

Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures

I Homoliak, F Toffalini, J Guarnizo, Y Elovici… - ACM Computing …, 2019 - dl.acm.org
… existing trends and further research directions … Insider threats are one of the most challenging
attack models to deal with in practice. According to a recent survey, 27% of all cyber crime

A review of recent advances, challenges, and opportunities in malicious insider threat detection using machine learning methods

FR Alzaabi, A Mehmood - IEEE Access, 2024 - ieeexplore.ieee.org
Studies surveyed in this paper indicate that these advanced … rise in the sophistication of
cyber threats, particularly those … In sum, the future trends in malicious insider threat detection …

A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations

MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin… - Applied Sciences, 2020 - mdpi.com
… This study aims to discuss the insider threat problem in a … the insider or attacker to understand
its nature, such as insider … of cyber threats, most studies are conducted either on “cyber” …

Identifying attack patterns for insider threat detection

I Agrafiotis, JRC Nurse, O Buckley, P Legg… - … Fraud & Security, 2015 - Elsevier
… case study as a series of attack steps and identify common trends between different attacks.
research on the framework for characterising insider attacks, by focusing on insider attack

[PDF][PDF] A descriptive literature review and classification of insider threat research

J Ophoff, A Jensen, J Sanderson-Smith… - … of Informing Science & …, 2014 - Citeseer
… in development processes, graph-based anomaly detection, the various attack vectors of
threats, trends in detection research and even the use of criminal court proceedings to identify …