Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures

I Homoliak, F Toffalini, J Guarnizo, Y Elovici… - ACM Computing …, 2019 - dl.acm.org
Insider threats are one of today's most challenging cybersecurity issues that are not well
addressed by commonly employed security solutions. In this work, we propose structural …

Impact and key challenges of insider threats on organizations and critical businesses

N Saxena, E Hayes, E Bertino, P Ojo, KKR Choo… - Electronics, 2020 - mdpi.com
The insider threat has consistently been identified as a key threat to organizations and
governments. Understanding the nature of insider threats and the related threat landscape …

Detecting insider threat via a cyber-security culture framework

A Georgiadou, S Mouzakitis… - Journal of Computer …, 2022 - Taylor & Francis
Insider threat has been recognized by both scientific community and security professionals
as one of the gravest security hazards for private companies, institutions, and governmental …

Understanding insider threat: A framework for characterising attacks

JRC Nurse, O Buckley, PA Legg… - 2014 IEEE security …, 2014 - ieeexplore.ieee.org
The threat that insiders pose to businesses, institutions and governmental organisations
continues to be of serious concern. Recent industry surveys and academic literature provide …

Learning to recognize shadows in monochromatic natural images

J Zhu, KGG Samuel, SZ Masood… - 2010 IEEE Computer …, 2010 - ieeexplore.ieee.org
This paper addresses the problem of recognizing shadows from monochromatic natural
images. Without chromatic information, shadow classification is very challenging because …

A review of insider threat detection approaches with IoT perspective

A Kim, J Oh, J Ryu, K Lee - IEEE Access, 2020 - ieeexplore.ieee.org
Security professionals, government agencies, and corporate organizations have found an
inherent need to prevent or mitigate attacks from insider threats. Accordingly, active research …

Effects of hand representations for typing in virtual reality

J Grubert, L Witzani, E Ofek, M Pahud… - … IEEE Conference on …, 2018 - ieeexplore.ieee.org
Alphanumeric text entry is a challenge for Virtual Reality (VR) applications. VR enables new
capabilities, impossible in the real world, such as an unobstructed view of the keyboard …

Temporal feature aggregation with attention for insider threat detection from activity logs

P Pal, P Chattopadhyay, M Swarnkar - Expert Systems with Applications, 2023 - Elsevier
Nowadays, insider attacks are emerging as one of the top cybersecurity threats. However,
the detection of insider threats is a more arduous task for many reasons. A significant cause …

Modeling human behavior to anticipate insider attacks

FL Greitzer, RE Hohimer - Journal of Strategic Security, 2011 - JSTOR
The insider threat ranks among the most pressing cyber-security challenges that threaten
government and industry information infrastructures. To date, no systematic methods have …

Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation

FL Greitzer, DA Frincke - Insider threats in cyber security, 2010 - Springer
The purpose of this chapter is to motivate the combination of traditional cyber security audit
data with psychosocial data, to support a move from an insider threat detection stance to one …