Bayesian network models in cyber security: a systematic review

S Chockalingam, W Pieters, A Teixeira… - Secure IT Systems: 22nd …, 2017 - Springer
Abstract Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber
security especially due to their capability to overcome data limitations. This is also …

Detecting insider threat via a cyber-security culture framework

A Georgiadou, S Mouzakitis… - Journal of Computer …, 2022 - Taylor & Francis
Insider threat has been recognized by both scientific community and security professionals
as one of the gravest security hazards for private companies, institutions, and governmental …

Learning to recognize shadows in monochromatic natural images

J Zhu, KGG Samuel, SZ Masood… - 2010 IEEE Computer …, 2010 - ieeexplore.ieee.org
This paper addresses the problem of recognizing shadows from monochromatic natural
images. Without chromatic information, shadow classification is very challenging because …

Detecting insider threat from enterprise social and online activity data

G Gavai, K Sricharan, D Gunning, R Rolleston… - Proceedings of the 7th …, 2015 - dl.acm.org
Insider threat is a significant security risk for organizations. In this paper, we attempt to
discover insider threat by identifying abnormal behavior in enterprise social and online …

The “human factor” in cybersecurity: Exploring the accidental insider

L Hadlington - Psychological and behavioral examinations in cyber …, 2018 - igi-global.com
A great deal of research has been devoted to the exploration and categorization of threats
posed from malicious attacks from current employees who are disgruntled with the …

Effects of hand representations for typing in virtual reality

J Grubert, L Witzani, E Ofek, M Pahud… - … IEEE Conference on …, 2018 - ieeexplore.ieee.org
Alphanumeric text entry is a challenge for Virtual Reality (VR) applications. VR enables new
capabilities, impossible in the real world, such as an unobstructed view of the keyboard …

Insider threat detection: a solution in search of a problem

JR Schoenherr, R Thomson - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Insider threats (IT) reflect a growing concern in security communities. Despite a rapid
increase in the number of papers examining IT, definitions, research methods, models, and …

Employees attitude towards cyber security and risky online behaviours: An empirical assessment in the United Kingdom

L Hadlington - International Journal of Cyber Criminology, 2018 - irep.ntu.ac.uk
The present study aimed to explore if the size of company an individual works for, age or
attitudes towards cyber security affected frequency to engage in risky online behaviours. A …

Identifying at-risk employees: Modeling psychosocial precursors of potential insider threats

FL Greitzer, LJ Kangas, CF Noonan… - 2012 45th Hawaii …, 2012 - ieeexplore.ieee.org
In many insider crimes, managers and other coworkers observed that the offenders had
exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers …

Detecting insider threats through language change.

PJ Taylor, CJ Dando, TC Ormerod, LJ Ball… - Law and human …, 2013 - psycnet.apa.org
The act of conducting an insider attack carries with it cognitive and social challenges that
may affect an offender's day-to-day work behavior. We test this hypothesis by examining the …