Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,730,927 papers from all fields of science
Search
Sign In
Create Free Account
Insider threat
An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Broader (1)
Computer security
Insider threat management
Misuse detection
Threat (computer)
Unified threat management
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
Yanzhi Ren
,
Mooi Choo Choo Chuah
,
J. Yang
,
Yingying Chen
IEEE Wireless Communication and Networking…
2010
Corpus ID: 2298525
The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the…
Expand
2009
2009
Insider Threat Detection Using Graph-Based Approaches
W. Eberle
,
L. Holder
Cybersecurity Applications & Technology…
2009
Corpus ID: 15551845
Protecting our nation's cyber infrastructure and securing sensitive information are critical challenges for homeland security and…
Expand
2009
2009
Cryptanalysis of a Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment
Te-Yu Chen
,
M. Hwang
,
Cheng-Chi Lee
,
J. Jan
International Conference on Innovative Computing…
2009
Corpus ID: 14477779
The conventional user authentication scheme is designed for a single-sever environment. In the case of multiple servers, a user…
Expand
2009
2009
Evaluating the Performance of Bay Irrigation in the GMID
R. J. Smith
,
M. Gillies
,
M. Shanahan
,
B. Campbell
,
B. Williamson
2009
Corpus ID: 56057630
The CRC for Irrigation Futures recently undertook a project piloting use of the IrriMATE performance evaluation process in bay…
Expand
2008
2008
Insider threat detection using situation-aware MAS
J. Buford
,
L. Lewis
,
G. Jakobson
Fusion
2008
Corpus ID: 13096784
Previous work in automating insider threat detection has included top-down analysis and fusion of events from network and system…
Expand
Review
2008
Review
2008
08302 Summary - Countering Insider Threats
Christian W. Probst
,
Jeffrey Hunker
,
M. Bishop
,
D. Gollmann
Countering Insider Threats
2008
Corpus ID: 46647443
This article summarizes the objectives and structure of a seminar with the same title, held from July 20th to July 25th, 2008…
Expand
2008
2008
Digital Fingerprinting Based on Keystroke Dynamics
Ahmed Awad E. Ahmed
,
I. Traoré
,
A. Ahmed
International Symposium on Human Aspects of…
2008
Corpus ID: 18093953
Digital fingerprinting is an important but still challenging aspect of network forensics. This paper introduces an effective way…
Expand
2007
2007
Insider Threat Analysis Using Information-Centric Modeling
Duc T. Ha
,
S. Upadhyaya
,
H. Ngo
,
S. Pramanik
,
R. Chinchani
,
S. Mathew
IFIP Int. Conf. Digital Forensics
2007
Corpus ID: 1194422
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system…
Expand
Review
2006
Review
2006
The role of behavioral research and profiling in malicious cyber insider investigations
E. Shaw
Digital Investigation. The International Journal…
2006
Corpus ID: 30624967
1936
1936
Ladies of the press : the story of women in journalism by an insider
Ishbel Ross
1936
Corpus ID: 142045418
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE