Articles with "insider attacks" as a keyword



Photo from wikipedia

Anomaly Detection for Insider Attacks from Untrusted Intelligent Electronic Devices in Substation Automation Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3142022

Abstract: In recent decades, cyber security issues in IEC 61850-compliant substation automation systems (SASs) have become growing concerns. Many researchers have developed various strategies to detect malicious behaviours of SASs during the system operational stage, such… read more here.

Keywords: insider attacks; automation systems; substation automation; detection ... See more keywords
Photo by nampoh from unsplash

Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2019.2933464

Abstract: The radical advancement in web services has drawn more attention toward intensifying the security of numerous applications that interact and serve the Internet users. In order to access the different applications on the web, users… read more here.

Keywords: authentication; insider; insider attack; password ... See more keywords
Photo from wikipedia

A System Architecture for the Detection of Insider Attacks in Big Data Systems

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2017.2768533

Abstract: In big data systems, the infrastructure is such that large amounts of data are hosted away from the users. In such a system information security is considered as a major challenge. From a customer perspective,… read more here.

Keywords: big data; data systems; detection; system ... See more keywords