Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Masqueraders are users who take control of a machine and perform malicious activities such as data exfiltration or system misuse on behalf of legitimate users. In the literature, there are various approaches for detecting masqueraders by... more
    • by 
    •   4  
      Anomaly DetectionOne class ClassificationInsider ThreatMalicious insider threat
Insider threats are one of today's most challenging cybersecurity issues that are not well addressed by commonly employed security solutions. In this work we propose structural taxonomy and novel categorization of research that contribute... more
    • by 
    •   4  
      SurveyInsider ThreatMalicious insider threatUnintentional insider threat
In this paper we present the TWOS dataset that contains realistic instances of insider threats based on a gamified competition. The competition simulated user interactions in/among competing companies, where two types of behaviors (normal... more
    • by 
    •   5  
      Insider researchInsider ThreatImbalanced DatasetsDataset