Articles with "insider threat" as a keyword



Photo from wikipedia

Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2957055

Abstract: Insider threat detection has drawn increasing attention in recent years. In order to capture a malicious insider’s digital footprints that occur scatteredly across a wide range of audit data sources over a long period of… read more here.

Keywords: simultaneous neural; insider threat; threat; threat identification ... See more keywords
Photo by bvp from unsplash

Techniques and countermeasures for preventing insider threats

Sign Up to like & get
recommendations!
Published in 2022 at "PeerJ Computer Science"

DOI: 10.7717/peerj-cs.938

Abstract: With the wide use of technologies nowadays, various security issues have emerged. Public and private sectors are both spending a large portion of their budget to protect the confidentiality, integrity, and availability of their data… read more here.

Keywords: countermeasures preventing; insider; insider threat; insider threats ... See more keywords