Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures

I Homoliak, F Toffalini, J Guarnizo, Y Elovici… - ACM Computing …, 2019 - dl.acm.org
Insider threats are one of today's most challenging cybersecurity issues that are not well
addressed by commonly employed security solutions. In this work, we propose structural …

Cyber situational awareness–a systematic review of the literature

U Franke, J Brynielsson - Computers & security, 2014 - Elsevier
Cyber situational awareness is attracting much attention. It features prominently in the
national cyber strategies of many countries, and there is a considerable body of research …

Detecting insider threat via a cyber-security culture framework

A Georgiadou, S Mouzakitis… - Journal of Computer …, 2022 - Taylor & Francis
Insider threat has been recognized by both scientific community and security professionals
as one of the gravest security hazards for private companies, institutions, and governmental …

Analysis of high volumes of network traffic for advanced persistent threat detection

M Marchetti, F Pierazzi, M Colajanni, A Guido - Computer Networks, 2016 - Elsevier
Abstract Advanced Persistent Threats (APTs) are the most critical menaces to modern
organizations and the most challenging attacks to detect. They span over long periods of …

Behavioral analysis of insider threat: A survey and bootstrapped prediction in imbalanced data

A Azaria, A Richardson, S Kraus… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The problem of insider threat is receiving increasing attention both within the computer
science community as well as government and industry. This paper starts by presenting a …

A review of insider threat detection approaches with IoT perspective

A Kim, J Oh, J Ryu, K Lee - IEEE Access, 2020 - ieeexplore.ieee.org
Security professionals, government agencies, and corporate organizations have found an
inherent need to prevent or mitigate attacks from insider threats. Accordingly, active research …

Effects of hand representations for typing in virtual reality

J Grubert, L Witzani, E Ofek, M Pahud… - … IEEE Conference on …, 2018 - ieeexplore.ieee.org
Alphanumeric text entry is a challenge for Virtual Reality (VR) applications. VR enables new
capabilities, impossible in the real world, such as an unobstructed view of the keyboard …

[HTML][HTML] VISTA: An inclusive insider threat taxonomy, with mitigation strategies

K Renaud, M Warkentin, G Pogrebna… - Information & …, 2024 - Elsevier
Insiders have the potential to do a great deal of damage, given their legitimate access to
organisational assets and the trust they enjoy. Organisations can only mitigate insider …

Modeling human behavior to anticipate insider attacks

FL Greitzer, RE Hohimer - Journal of Strategic Security, 2011 - JSTOR
The insider threat ranks among the most pressing cyber-security challenges that threaten
government and industry information infrastructures. To date, no systematic methods have …

Fiends and fools: a narrative review and neo-socioanalytic perspective on personality and insider threats

AR Marbut, PD Harms - Journal of Business and Psychology, 2024 - Springer
Insider threats represent a serious threat to organizations but are considered to be difficult to
predict and prevent. Although a growing body of research has examined personological …