Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cyber Insider Threat

Cyber Insider Threat, or CINDER, is a DARPA program to develop novel approaches to the detection of activities within military-interest networks that… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
An insider threat scenario refers to the outcome of a set of malicious activities caused by intentional or unintentional misuse… Expand
  • table I
  • figure 1
  • table II
  • figure 2
  • figure 3
Is this relevant?
2018
2018
Threats from the inside of an organization's perimeters are a significant problem since it is difficult to distinguish them from… Expand
  • table 1
  • table 2
  • figure 1
Is this relevant?
2017
2017
One of the problems with insider threat research is the lack of a complete 360° view of an insider threat dataset due to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2014
2014
This study examines human trustworthiness as a key component in countering insider threats. The term insider threat refers to… Expand
Is this relevant?
2014
2014
The concept of information security and privacy have been discussed and researched in many disciplines. In the realm of political… Expand
Is this relevant?
2013
2013
Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article… Expand
  • table 2
  • table 1
  • figure 1
  • figure 2
Is this relevant?
2011
2011
Cyber insider threat is a difficult problem because it is always covered by a legal identity. Researchers have proposed many… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2008
2008
The authors describe a behavioral theory of the dynamics of insider-threat risks. Drawing on data related to information… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2007
2007
Progress in insider-threat detection is currently limited by a lack of realistic, publicly available, real-world data. For… Expand
  • figure 1
  • table 1
  • table 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Insider threat is widely recognised as an issue of utmost importance for IS security management. In this paper, we investigate… Expand
  • figure 1
  • table 1
  • table 2
Is this relevant?