Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,144,925 papers from all fields of science
Search
Sign In
Create Free Account
Cyber Insider Threat
Cyber Insider Threat, or CINDER, is a DARPA program to develop novel approaches to the detection of activities within military-interest networks that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Anomaly Detection at Multiple Scales
EINSTEIN
Investigative Data Warehouse
PRISM (surveillance program)
Expand
Broader (3)
Computer forensics
Computer security
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Prediction of human error using eye movements patterns for unintentional insider threat detection
Hassan Takabi
,
Yessir Hashem
,
R. Dantu
International Conference on Identity, Security…
2018
Corpus ID: 3872708
Threats from the inside of an organization's perimeters are a significant problem since it is difficult to distinguish them from…
Expand
2014
2014
Cyber Insider Threat in Virtual Organizations
S. Ho
,
J. Hollister
2014
Corpus ID: 55596346
The concept of information security and privacy have been discussed and researched in many disciplines. In the realm of political…
Expand
2014
2014
Cyber Insider Threat: Trustworthiness in Virtual Organizations
S. Ho
2014
Corpus ID: 149809879
2013
2013
Training organizational supervisors to detect and prevent cyber insider threats: two approaches
D. Andrews
,
J. Freeman
,
+4 authors
Patricia Fitzgerald
EAI Endorsed Trans. Security Safety
2013
Corpus ID: 41985372
Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article…
Expand
2011
2011
Cyber Insider Threats Situation Awareness Using Game Theory and Information Fusion-based User Behavior Predicting Algorithm
K. Tang
,
Mingyuan Zhao
,
Mingtian Zhou
2011
Corpus ID: 15930824
Cyber insider threat is a difficult problem because it is always covered by a legal identity. Researchers have proposed many…
Expand
2009
2009
Proactive Insider-threat Detection - Against Confidentiality in Sensitive Pervasive Applications
Joon S. Park
,
Jae-Hyun Yim
,
Jason Hallahan
International Conference on Enterprise…
2009
Corpus ID: 32426499
The primary objective of this research is to mitigate insider threats against sensitive information stored in an organization’s…
Expand
2008
2008
Systematizing Insider Threat mitigation
G. Magklaras
2008
Corpus ID: 8169101
2007
2007
Toward Realistic and Artifact-Free Insider-Threat Data
Kevin S. Killourhy
,
R. Maxion
Asia-Pacific Computer Systems Architecture…
2007
Corpus ID: 10127372
Progress in insider-threat detection is currently limited by a lack of realistic, publicly available, real-world data. For…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE