Skip to search formSkip to main contentSkip to account menu

Insider threat

An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the… 
2009
2009
Protecting our nation's cyber infrastructure and securing sensitive information are critical challenges for homeland security and… 
2009
2009
The conventional user authentication scheme is designed for a single-sever environment. In the case of multiple servers, a user… 
2009
2009
The CRC for Irrigation Futures recently undertook a project piloting use of the IrriMATE performance evaluation process in bay… 
2008
2008
Previous work in automating insider threat detection has included top-down analysis and fusion of events from network and system… 
Review
2008
Review
2008
This article summarizes the objectives and structure of a seminar with the same title, held from July 20th to July 25th, 2008… 
2008
2008
Digital fingerprinting is an important but still challenging aspect of network forensics. This paper introduces an effective way… 
2007
2007
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system…