In this paper we present open research questions and options for data analysis of our previously designed dataset called TWOS: The Wolf of SUTD. In specified research questions, we illustrate the potential use of the TWOS dataset in multiple areas of cyber security, which does not limit only to malicious insider threat detection but are also related to authorship verification and identification, continuous authentication, and sentiment analysis. For the purpose of investigating the research questions, we present several state-of-the-art features applicable to collected data sources, and thus we provide researchers with a guidance how to start with data analysis. The TWOS dataset was collected during a gamified competition that was devised i...
This research uses machine learning and outlier analysis to detect potentially hostile insiders thro...
Insider threat problems are widespread in industry today. They have resulted in huge losses to orga...
Submitted in partial fulfillment of the requirements for the Degree of Masters of Science in Informa...
Cyber security is vital to the success of today’s digital economy. The major security threats are co...
Over the past few years, Insider threats have been a growing concern for the organizations. The conc...
In this paper we revisit the advances made on invalidation policies to explore attack possibilities ...
Real-world data collection poses an important challenge in the security field. Insider and masquerad...
In this paper we revisit the advances made on invalidation policies to explore attack possibilities ...
This paper describes the Detection of Threat Behavior (DTB) project, a joint effort being conducted ...
Abstract—This research uses machine learning and outlier analysis to detect potentially hostile insi...
Abstract—The problem of insider threat is receiving increasing attention both within the computer sc...
An insider threats has become one of the most challenging malicious activity in cybersecurity defens...
The Insider Threat Test Dataset is a collection of synthetic insider threat test datasets that provi...
The reason of countries development in industrial and commercial enterprises fields in those countri...
The reason of countries development in industrial and commercial enterprises fields in those countri...
This research uses machine learning and outlier analysis to detect potentially hostile insiders thro...
Insider threat problems are widespread in industry today. They have resulted in huge losses to orga...
Submitted in partial fulfillment of the requirements for the Degree of Masters of Science in Informa...
Cyber security is vital to the success of today’s digital economy. The major security threats are co...
Over the past few years, Insider threats have been a growing concern for the organizations. The conc...
In this paper we revisit the advances made on invalidation policies to explore attack possibilities ...
Real-world data collection poses an important challenge in the security field. Insider and masquerad...
In this paper we revisit the advances made on invalidation policies to explore attack possibilities ...
This paper describes the Detection of Threat Behavior (DTB) project, a joint effort being conducted ...
Abstract—This research uses machine learning and outlier analysis to detect potentially hostile insi...
Abstract—The problem of insider threat is receiving increasing attention both within the computer sc...
An insider threats has become one of the most challenging malicious activity in cybersecurity defens...
The Insider Threat Test Dataset is a collection of synthetic insider threat test datasets that provi...
The reason of countries development in industrial and commercial enterprises fields in those countri...
The reason of countries development in industrial and commercial enterprises fields in those countri...
This research uses machine learning and outlier analysis to detect potentially hostile insiders thro...
Insider threat problems are widespread in industry today. They have resulted in huge losses to orga...
Submitted in partial fulfillment of the requirements for the Degree of Masters of Science in Informa...