Simulation games platform for unintentional perpetrator attack vector identification

M Macak, A Kruzikova, L Daubner… - Proceedings of the IEEE …, 2020 - dl.acm.org
Cyber-security protection of critical systems is one of the major challenges of today.
Although the attacks typically originate from attackers with malicious intent, a substantial …

Effects of cyber disruption in a distributed team decision making task

V Finomore, A Sitz, E Blair, K Rahill… - Proceedings of the …, 2013 - journals.sagepub.com
Stories of cyber-attacks have been prevalent in the public media and the cyber security
market has grown greatly to help meet this demand. However, much of the effort has been …

CopAS: A Big Data Forensic Analytics System

M Macak, M Stovcik, T Rebok, M Ge, B Rossi… - arXiv preprint arXiv …, 2022 - arxiv.org
With the advancing digitization of our society, network security has become one of the critical
concerns for most organizations. In this paper, we present CopAS, a system targeted at Big …

Unintentional insider threat assessment framework: Examining the human security indicators in healthcare cybersecurity

LH Yeo - 2023 - search.proquest.com
The healthcare industry continues to be the sector that suffers the highest cost of a data
breach compared to other sectors. The human factor continues to be the biggest threat to …

Companies proactively seek out internal threats

E Shein - Communications of the ACM, 2015 - dl.acm.org
Companies proactively seek out internal threats Page 1 NOVEMBER 2015 | VOL. 58 | NO. 11 |
COMMUNICATIONS OF THE ACM 15 news IMA GE B YB ALEFIRE9/DREAMS TIME.COM …

Identification of Unintentional Perpetrator Attack Vectors using Simulation Games: A Case Study

M Macak, S Bojnak, B Buhnova - 2021 16th conference on …, 2021 - ieeexplore.ieee.org
In our digital era, insider attacks are among the serious underresearched areas of the
cybersecurity landscape. A significant type of insider attack is facilitated by employees …

[PDF][PDF] Abnormal behavior analysis in office automation system within organizations

Y Wang, Y Zhou, C Zhu, X Zhu, W Zhang - International Journal of …, 2017 - ijcce.org
Insider threat is a serious and increasing concern for many organizations. The group of
individuals who operate within the organization have access to highly confidential and …

[PDF][PDF] Process mining methods for detection of malicious computer usage by masquerading traitors

BCM STOVCIK - is.muni.cz
This thesis aims to enrich the topic of insider attack detection techniques. We present an
examination of topics that can be useful for the detection of masquerading traitors in …

[PDF][PDF] Ergonomics Society Annual Meeting

B Knott, V Finomore, A Sitz, E Blair, K Rahill… - academia.edu
Stories of cyber-attacks have been prevalent in the public media and the cyber security
market has grown greatly to help meet this demand. However, much of the effort has been …

[PDF][PDF] Creating a Safer Online Learning Environment for Students and Professors: Cybersecurity in Online Learning Environments

SL Leandro - 2013 - qspace.library.queensu.ca
This project report is a design of an online security investigation from the perspective of
professors and students, to provide information to higher educational institutions that would …