Detecting insider threat via a cyber-security culture framework

A Georgiadou, S Mouzakitis… - Journal of Computer …, 2022 - Taylor & Francis
Insider threat has been recognized by both scientific community and security professionals
as one of the gravest security hazards for private companies, institutions, and governmental …

Anomaly detection with graph convolutional networks for insider threat and fraud detection

J Jiang, J Chen, T Gu, KKR Choo, C Liu… - MILCOM 2019-2019 …, 2019 - ieeexplore.ieee.org
Anomaly detection generally involves the extraction of features from entities' or users'
properties, and the design of anomaly detection models using machine learning or deep …

[HTML][HTML] VISTA: An inclusive insider threat taxonomy, with mitigation strategies

K Renaud, M Warkentin, G Pogrebna… - Information & …, 2024 - Elsevier
Insiders have the potential to do a great deal of damage, given their legitimate access to
organisational assets and the trust they enjoy. Organisations can only mitigate insider …

Including insider threats into risk management through Bayesian threat graph networks

N d'Ambrosio, G Perrone, SP Romano - Computers & Security, 2023 - Elsevier
Cybersecurity incidents do represent a serious danger for companies. In fact, the number of
cyber crimes is exponentially growing in a scenario where the global COVID-19 pandemic …

[HTML][HTML] Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations

A Erola, I Agrafiotis, M Goldsmith, S Creese - Journal of Information Security …, 2022 - Elsevier
Insider threat is a persistent concern for organisations and business alike that has attracted
the interest of the research community, resulting in numerous behavioural models and tools …

Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks

N Khan, R J. Houghton, S Sharples - Cognition, Technology & Work, 2022 - Springer
The exploitation of so-called insiders is increasingly recognised as a common vector for
cyberattacks. Emerging work in this area has considered the phenomenon from various …

Insider threat risk prediction based on Bayesian network

N Elmrabit, SH Yang, L Yang, H Zhou - Computers & Security, 2020 - Elsevier
Insider threat protection has received increasing attention in the last ten years due to the
serious consequences of malicious insider threats. Moreover, data leaks and the sale of …

Inference enterprise models: An approach to organizational performance improvement

DM Buede, ET Axelrad, DP Brown… - … : Data Mining and …, 2018 - Wiley Online Library
We demonstrate that our success in solving a set of increasingly complex challenge
problems is associated with an inference enterprise (IE) using inference enterprise models …

An investigation of insider threat mitigation based on EEG signal classification

JH Kim, CM Kim, MS Yim - Sensors, 2020 - mdpi.com
This study proposes a scheme to identify insider threats in nuclear facilities through the
detection of malicious intentions of potential insiders using subject-wise classification …

A framework for data-driven physical security and insider threat detection

V Mavroeidis, K Vishi, A Jøsang - 2018 IEEE/ACM International …, 2018 - ieeexplore.ieee.org
This paper presents PSO, an ontological framework and a methodology for improving
physical security and insider threat detection. PSO can facilitate forensic data analysis and …