Scalable predicting model for insider threat

被引:0
|
作者
College of Computer Science and Technology, Jilin University, Changchun 130012, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Xuebao | 2006年 / 8卷 / 1346-1355期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] A Parallel and Scalable Framework for Insider Threat Detection
    Diop, Abdoulaye
    Emad, Nahid
    Winter, Thierry
    2020 IEEE 27TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING, DATA, AND ANALYTICS (HIPC 2020), 2020, : 101 - 110
  • [2] An Insider Threat Prediction Model
    Kandias, Miltiadis
    Mylonas, Alexios
    Virvilis, Nikos
    Theoharidou, Marianthi
    Gritzalis, Dimitris
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 26 - 37
  • [3] A Model-Based Approach to Predicting the Performance of Insider Threat Detection Systems
    Roberts, Shannon C.
    Holodnak, John T.
    Trang Nguyen
    Yuditskaya, Sophia
    Milosavljevic, Maja
    Streilein, William W.
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 314 - 323
  • [4] The Insider Threat in Scalable Distributed Systems: Algorithms, Metrics and Gaps
    Amir, Yair
    STC'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SCALABLE TRUSTED COMPUTING, 2007, : 49 - 49
  • [5] Predicting and Preventing Insider Threat in Relational Database Systems
    Yaseen, Qussai
    Panda, Brajendra
    INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 368 - 383
  • [6] Developing a conceptual model for insider threat
    Whitty, Monica T.
    JOURNAL OF MANAGEMENT & ORGANIZATION, 2021, 27 (05) : 911 - 929
  • [7] DANTE: Predicting Insider Threat using LSTM on system logs
    Ma, Qicheng
    Rastogi, Nidhi
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1152 - 1157
  • [8] Performance Analysis of an Insider Threat Mitigation Model
    Althebyan, Qutaibah
    Panda, Brajendra
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 719 - 725
  • [9] An Access Abstraction Model for Mitigating the Insider Threat
    Jenkins, Jonathan
    ACMSE 2020: PROCEEDINGS OF THE 2020 ACM SOUTHEAST CONFERENCE, 2020, : 320 - 321
  • [10] Predicting Insider Threat Risks through Linguistic Analysis of Electronic Communication
    Brown, Christopher R.
    Watkins, Alison
    Greitzer, Frank L.
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1849 - 1858