Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,701 papers from all fields of science
Search
Sign In
Create Free Account
Cyber Insider Threat
Cyber Insider Threat, or CINDER, is a DARPA program to develop novel approaches to the detection of activities within military-interest networks that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Anomaly Detection at Multiple Scales
EINSTEIN
Investigative Data Warehouse
PRISM (surveillance program)
Expand
Broader (3)
Computer forensics
Computer security
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Machine learning based Insider Threat Modelling and Detection
Duc C. Le
,
N. Zincir-Heywood
IFIP/IEEE Symposium on Integrated Network…
2019
Corpus ID: 84836727
Recently, malicious insider attacks represent one of the most damaging threats to companies and government agencies. This paper…
Expand
2018
2018
Prediction of human error using eye movements patterns for unintentional insider threat detection
Hassan Takabi
,
Yessir Hashem
,
R. Dantu
International Conference on Identity, Security…
2018
Corpus ID: 3872708
Threats from the inside of an organization's perimeters are a significant problem since it is difficult to distinguish them from…
Expand
2018
2018
Towards a data-driven behavioral approach to prediction of insider-threat
Subhasree Basu
,
Y. H. V. Chua
,
+4 authors
J. Dauwels
IEEE International Conference on Big Data (Big…
2018
Corpus ID: 59234423
Insider threats pose a challenge to all companies and organizations. Identification of culprit after an attack is often too late…
Expand
2015
2015
Modeling deception in information security as a hypergame: a primer
Gutierrez Christopher
,
Mohammed H. Almeshekah
,
Jeffrey Avery
,
S. Bagchi
,
E. Spafford
2015
Corpus ID: 264588262
Hypergames are a branch of game theory to model and analyze game theoretic conflicts between multiple players who may have…
Expand
2014
2014
Cyber Insider Threat in Virtual Organizations
S. Ho
,
J. Hollister
2014
Corpus ID: 55596346
The concept of information security and privacy have been discussed and researched in many disciplines. In the realm of political…
Expand
2013
2013
Training organizational supervisors to detect and prevent cyber insider threats: two approaches
D. Andrews
,
J. Freeman
,
+4 authors
Patricia Fitzgerald
EAI Endorsed Trans. Security Safety
2013
Corpus ID: 41985372
Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article…
Expand
2011
2011
Cyber Insider Threats Situation Awareness Using Game Theory and Information Fusion-based User Behavior Predicting Algorithm
K. Tang
,
Mingyuan Zhao
,
Mingtian Zhou
2011
Corpus ID: 15930824
Cyber insider threat is a difficult problem because it is always covered by a legal identity. Researchers have proposed many…
Expand
2009
2009
Proactive Insider-threat Detection - Against Confidentiality in Sensitive Pervasive Applications
Joon S. Park
,
Jae-Hyun Yim
,
Jason Hallahan
International Conference on Enterprise…
2009
Corpus ID: 32426499
The primary objective of this research is to mitigate insider threats against sensitive information stored in an organization’s…
Expand
2008
2008
Systematizing Insider Threat mitigation
G. Magklaras
2008
Corpus ID: 8169101
2007
2007
Toward Realistic and Artifact-Free Insider-Threat Data
Kevin S. Killourhy
,
R. Maxion
Asia-Pacific Computer Systems Architecture…
2007
Corpus ID: 10127372
Progress in insider-threat detection is currently limited by a lack of realistic, publicly available, real-world data. For…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE