Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cyber Insider Threat

Cyber Insider Threat, or CINDER, is a DARPA program to develop novel approaches to the detection of activities within military-interest networks that… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Recently, malicious insider attacks represent one of the most damaging threats to companies and government agencies. This paper… Expand
  • figure 1
  • table I
  • table II
  • table III
  • table IV
2018
2018
An insider threat scenario refers to the outcome of a set of malicious activities caused by intentional or unintentional misuse… Expand
  • table I
  • figure 1
  • table II
  • figure 2
  • figure 3
2018
2018
Insider threats pose a challenge to all companies and organizations. Identification of culprit after an attack is often too late… Expand
  • figure 1
  • figure 2
  • figure 3
  • table III
  • table IV
2017
2017
One of the problems with insider threat research is the lack of a complete 360° view of an insider threat dataset due to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
2014
2014
The concept of information security and privacy have been discussed and researched in many disciplines. In the realm of political… Expand
2011
2011
Cyber insider threat is a difficult problem because it is always covered by a legal identity. Researchers have proposed many… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
2008
2008
The authors describe a behavioral theory of the dynamics of insider-threat risks. Drawing on data related to information… Expand
Highly Cited
2008
Highly Cited
2008
The authors describe a behavioral theory of the dynamics of insider-threat risks. Drawing on data related to information… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2007
2007
Progress in insider-threat detection is currently limited by a lack of realistic, publicly available, real-world data. For… Expand
  • figure 1
  • table 1
  • table 2
Highly Cited
2005
Highly Cited
2005
Insider threat is widely recognised as an issue of utmost importance for IS security management. In this paper, we investigate… Expand
  • figure 1
  • table 1
  • table 2