Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Masqueraders are users who take control of a machine and perform malicious activities such as data exfiltration or system misuse on behalf of legitimate users. In the literature, there are various approaches for detecting masqueraders by... more
    • by 
    •   4  
      Anomaly DetectionOne class ClassificationInsider ThreatMalicious insider threat
The purpose of this document is to provide guidance on safeguards that limit the introduction of malicious code into software and software systems in order to reduce the risk posed to software by malicious code. The intended audience for... more
    • by 
    •   3  
      Software AssuranceInsider ThreatMalicious Code Design
Introduction Among the problems discussed in this study is the issue of national security, broadly defined. Recognizing the need for safe existence of citizens, it is impossible not to note that we live in an increasingly global world,... more
    • by 
    •   30  
      LawInternational RelationsMulticulturalismSocial Sciences
Robert Hanssen, a career FBI Special Agent and " trusted insider " , was able to sell U.S. secrets to the Soviets and Russians for twenty-two years before his detection in December, 2000 by the FBI. Prior to Hanssen's arrest, the FBI's... more
    • by 
    •   4  
      IntelligenceFBI HistoryEspionageInsider Threat
Deutsche Afghanistan-Soldaten sahen sich während der ISAF-Mission wie ihre alliierten Verbündeten neben offenen Angriffen durch Aufständische auch den Gefahren sogenannter Insider bzw. Innentäter ausgesetzt. Im Beitrag wird am Beispiel... more
    • by 
    •   18  
      Combat VeteransWar StudiesAfghanistanSecurity Studies
The current consensus is that there is a worldwide gap in skills needed for a competent cybersecurity workforce. This skills gap has implications for the national security sector, both public and private. Although the view is that this... more
    • by 
    •   5  
      IntelligenceNational SecurityInsider ThreatCYBER ESPIONAGE
    • by 
    •   26  
      International RelationsViolenceInternational LawOrganizational Culture
Insider threats are one of today's most challenging cybersecurity issues that are not well addressed by commonly employed security solutions. In this work we propose structural taxonomy and novel categorization of research that contribute... more
    • by 
    •   4  
      SurveyInsider ThreatMalicious insider threatUnintentional insider threat
    • by 
    •   15  
      Organizational CultureInternational CooperationTissue BankNuclear security
This is a report submitted to the International Atomic Energy Agency (IAEA) under the IAEA-UGA (University of Georgia in Athens) Agreement on Coordinated Research Projects for Enhancement of Nuclear Security Culture. CITS/UGA staff and... more
    • by 
    •   5  
      TerrorismNuclear Security CultureInsider ThreatEffect of Radioactive Dispersal Devive
Among the problems discussed in this study is the issue of national security, broadly defined. Recognizing the need for safe existence of citizens, it is impossible not to note that we live in an increasingly global world, so discussion... more
    • by 
    •   27  
      LawInternational RelationsMulticulturalismInternational Law
The IAEA International Standards for Tissue Banks published in 2003 were based on the Standards then currently in use in the USA and the European Union, among others, and reflect the best practices associated with the operation of a... more
    • by 
    •   24  
      RadiationOrganizational CultureEuropean UnionInternational Cooperation
    • by 
    •   5  
      Computer ArchitectureSecurityCloud ComputingCyber Physical Systems
    • by 
    •   4  
      Information SecurityInformation Security CultureInsider ThreatAction Design Research
Mass violence is empirically rare. Studying mass violence presents numerous meth-odological challenges. The complex nature of mass violence events, which may have germinated in years prior, make attempts to use conventional research... more
    • by 
    •   9  
      CriminologyComplexity TheoryAgent Based SimulationComplex Systems
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and... more
    • by 
    •   7  
      Digital SignatureEncryptionOutsider ArtSigncryption
    • by 
    •   8  
      Computer ScienceInformation TechnologyInformation SecuritySecurity
This research analyzes how the perception of organizational injustice motivates the practice of cybercrimes in the workplace. In a qualitative and exploratory investigation, interviews have been carried out for 16 specialists in... more
    • by  and +1
    •   4  
      CybercrimeCyber SecurityJustiça OrganizacionalInsider Threat
Insider threat has become a serious issue to the many organizations. Various companies are increasingly deploying many information technologies to prevent unauthorized access to getting inside their system. Biometrics approaches have some... more
    • by 
    • Insider Threat
Insider Threats (ITs) are hard to identify because of their knowledge of the organization and motivation to avoid detection. One approach to detecting ITs utilizes Active Indicators (AI), stimuli that elicit a characteristic response from... more
    • by  and +1
    •   2  
      Cyber SecurityInsider Threat
    • by 
    •   7  
      BusinessCriminologySecurityRisk Management
Collaborative Information Systems (CIS) allow users to belong to different groups to communicate and interfere with shared tasks or documents for collaboration. Current Intrusion Detection Systems are not effective in detecting insider... more
    • by 
    •   5  
      Data MiningNetwork SecurityNetwork AnalysisAnomaly Detection
Information systems face several security threats, some of which originate by insiders. This paper presents a novel, interdisciplinary insider threat prediction model. It combines approaches, techniques, and tools from computer science... more
    • by 
    • Insider Threat
In this paper we present the TWOS dataset that contains realistic instances of insider threats based on a gamified competition. The competition simulated user interactions in/among competing companies, where two types of behaviors (normal... more
    • by 
    •   5  
      Insider researchInsider ThreatImbalanced DatasetsDataset
According to Transparency International, Australia is perceived to be one of the least corrupt countries in the world, although Australia's ranking in the latest Corruption Perceptions Index (Transparency International 2018) has recently... more
    • by 
    •   8  
      CriminologyPublic AdministrationOrganized CrimeCorruption (Corruption)
Insider Threat program approached for industry and government.  Discussions on how to approach security from a 21st Century perspective
    • by 
    •   4  
      International SecuritySecurityInsider ThreatIndustry market research
Insider’s malicious information security behaviours have always been a persistent problem and requiring urgent mitigation solutions. More recently, seminal calls for future research suggested exploring the influences of employee-workplace... more
    • by 
    •   5  
      Information SecurityInformation Security ManagementInsider ThreatGeneral Strain Theory
    • by 
    •   26  
      International RelationsViolenceInternational LawOrganizational Culture
    • by 
    •   7  
      ComputersOrganizationsFeature ExtractionDetectors
There is little literature examining the impact of non-crypto focused quantum computation threats such as maximum quasi clique, minimum clique cover, portfolio, risk optimization, asset degradation, and utility system distribution... more
    • by 
    •   5  
      Fraud Detection And PreventionSocial Network Analysis (SNA)Cyber SecurityInsider Threat
    • by 
    •   13  
      Organizational CultureArgentinaInternational CooperationTissue Bank
    • by 
    •   5  
      Computer ScienceComputer SecurityCloud ComputingInsider Threat
    • by 
    •   7  
      Computer ArchitectureSecurityMigrationCloud Computing
Abstract Purpose The purpose of this paper is to demonstrate how document protection has become a key object of concern for organizations, how the threat of leaks has led to an increase in security technologies and policies and how these... more
    • by 
    •   4  
      South KoreaSecuritizationWeberInsider Threat
This paper reviews and integrates several accepted psychological constructs into a behavioral model that can be adapted for practical use and suggests new tools to leverage this model to mitigate threats from insiders who may... more
    • by  and +1
    •   4  
      Behavioral SciencesSecurityCounterintelligenceInsider Threat
Attacks on the organization networks can be classified as external and internal attacks. For the purpose of this paper we consider that external attacks are generated by the attackers or from hosts outside the organization, and internal... more
    • by  and +1
    •   6  
      Computer ScienceInformation SecurityTrusted ComputingComputer Security
    • by 
    •   23  
      International RelationsOrganizational CultureSecurityTransatlantic relations
Durante los últimos años han proliferado en el mercado tecnológico soluciones relacionadas con la detección del fraude a través de sistemas de inteligencia artificial basada en explotación de datos masiva (Big Data). La detección de... more
    • by 
    •   4  
      Information SecurityFraud Detection And PreventionCounterintelligenceInsider Threat
According to Transparency International, Australia is perceived to be one of the least corrupt countries in the world, although Australia’s ranking in the latest Corruption Perceptions Index (Transparency International 2018) has recently... more
    • by 
    •   9  
      CriminologyPublic AdministrationPolitical ScienceOrganized Crime
THE IMPORTANCE OF PROTECTING NUCLEAR POWER plants, laboratories, and other facilities can hardly be overstated, especially in light of increased threats of terrorism. But the two principal components of nu-clear facility security—the... more
    • by 
    •   7  
      LeadershipMotivationVigilanceHUMAN FACTOR
Among the problems discussed in this study is the issue of national security, broadly defined. Recognizing the need for safe existence of citizens, it is impossible not to note that we live in an increasingly global world, so discussion... more
    • by 
    •   20  
      LawInternational RelationsMulticulturalismInternational Law
Book Details: Book Title: Computer Security & Risk Analysis Publisher: Independent Publishing, 2018 ISBN-13: 978-1731512895 ISBN-10: 1731512899 EAN: 9781731512895 Book language: English By (author) : Dileep Keshava Narayana Number of... more
    • by 
    •   7  
      Risk ManagementComputer SecurityRisk AnalysisEspionage
Background/ Explanation of Issues: Joint Publication 1-02 states deterrence “prevents adversary action through the presentation of a credible threat of unacceptable counteraction and belief that the cost of the action outweighs the... more
    • by 
    •   29  
      Russian StudiesAir Force StudiesDeterrenceCold War
A discussion on Insider Threat policies being developed by the federal government and industry's role in implementation.
    • by 
    •   4  
      International SecuritySecurityInsider ThreatIndustry market research
    • by 
    •   7  
      LeadershipMotivationVigilanceHUMAN FACTOR
This innovative approach narrates one of the crises of the late Hashemite monarchy from Wien. The Austrian capital (still under Soviet military occupation) took an unexpectedly-prominent role as the setting for both Iraq's centrist and... more
    • by 
    •   15  
      Iraqi HistoryOrganizational CultureIraqNuclear security
    • by 
    •   11  
      RadiationOrganizational CultureNuclear securitySterilization
Mass violence is empirically rare. Studying mass violence presents numerous meth-odological challenges. The complex nature of mass violence events, which may have germinated in years prior, make attempts to use conventional research... more
    • by  and +1
    •   10  
      CriminologyComputer ScienceComplexity TheoryAgent Based Simulation
    • by 
    •   5  
      Computer ScienceComputer SecurityCloud ComputingCluster Computing