Managing malicious insider risk through bandit

VH Berk, G Cybenko… - 2012 45th Hawaii …, 2012 - ieeexplore.ieee.org
The transition from system-to information-based security has continued steadily over the last
30 years. Correspondingly, it is increasingly not the computer that is at risk, but the …

Decision support procedure in the insider threat domain

JP Murphy, VH Berk… - 2012 IEEE Symposium …, 2012 - ieeexplore.ieee.org
Effective mitigation of the Insider Threat in complex organizations is not simply a matter
of'fire-and-forget'. Thorough routines are required to minimize the chances of malicious …

Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost Measures

CS Oehmen, TE Carroll, PC Paulson, DM Best… - Proceedings of the …, 2015 - dl.acm.org
As cyber attacks on enterprise systems and critical infrastructure increase in prevalence and
severity, persistent presence of adversaries in these systems is a common theme. While …