Abstract — The annual incidence of insider attacks continues to grow, and there are indications this trend will continue. While there are a number of existing tools that can accurately identify known attacks, these are reactive (as opposed to proactive) in their enforcement, and may be eluded by previously unseen, adversarial behaviors. This paper proposes an approach that combines Structural Anomaly Detection (SA) from social and information networks and Psychological Profiling (PP) of individuals. SA uses technologies including graph analysis, dynamic tracking, and machine learning to detect structural anomalies in large-scale information network data, while PP constructs dynamic psychological profiles from behavioral patterns. Threats ar...
The cyber domain is a great business enabler providing many types of enterprises new opportunities s...
Detection of insider threats relies on monitoring individuals and their interactions with organizati...
Abstract. Existing research on net-centric attacks has focused on the detection of attack events on ...
The insider-threat problem continues to be a major risk to both public and private sectors, where th...
The insider-threat problem continues to be a major risk to both public and private sectors, where th...
In network security the organizations are ever growing to identify insider threats. Those who have a...
Anger, aggression and confrontational behaviour (Greitzer et al., 2012) is one of 12 psychosocial pr...
The current fight between security experts and malware authors is an arms race. In this race, malwar...
This study examines perceptions of human trustworthiness as a key component in countering insider t...
While most security projects have focused on fending off attacks coming from outside the organizatio...
Insider attacks are an ever-increasing threat for organizations, with dire consequences. Rogue emplo...
Information technology advancements made during the past decade have made detecting adversaries extr...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
Cyber attacks against companies and organizations can result in high impact losses that include dama...
Advanced Persistent Threats (APTs) are the most sophisticated attacks for modern information systems...
The cyber domain is a great business enabler providing many types of enterprises new opportunities s...
Detection of insider threats relies on monitoring individuals and their interactions with organizati...
Abstract. Existing research on net-centric attacks has focused on the detection of attack events on ...
The insider-threat problem continues to be a major risk to both public and private sectors, where th...
The insider-threat problem continues to be a major risk to both public and private sectors, where th...
In network security the organizations are ever growing to identify insider threats. Those who have a...
Anger, aggression and confrontational behaviour (Greitzer et al., 2012) is one of 12 psychosocial pr...
The current fight between security experts and malware authors is an arms race. In this race, malwar...
This study examines perceptions of human trustworthiness as a key component in countering insider t...
While most security projects have focused on fending off attacks coming from outside the organizatio...
Insider attacks are an ever-increasing threat for organizations, with dire consequences. Rogue emplo...
Information technology advancements made during the past decade have made detecting adversaries extr...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
Cyber attacks against companies and organizations can result in high impact losses that include dama...
Advanced Persistent Threats (APTs) are the most sophisticated attacks for modern information systems...
The cyber domain is a great business enabler providing many types of enterprises new opportunities s...
Detection of insider threats relies on monitoring individuals and their interactions with organizati...
Abstract. Existing research on net-centric attacks has focused on the detection of attack events on ...