[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 15 Jan 2025Bibliometrics
Skip Table Of Content Section
SECTION: Special Issue on Insider Threats
introduction
Open Access
Introduction to the Special Issue on Insider Threats
Article No.: 1, Pages 1–3https://doi.org/10.1145/3477501
research-article
Open Access
Insiders Dissected: New Foundations and a Systematisation of the Research on Insiders
Article No.: 2, Pages 1–35https://doi.org/10.1145/3473674

The insider threat is often cited as one of the most challenging threats for security practitioners. Even though this topic is receiving considerable attention, two main problems remain unsolved. First, research on insider threats is focusing on many ...

research-article
Open Access
Results From Invoking Artificial Neural Networks to Measure Insider Threat Detection & Mitigation
Article No.: 3, Pages 1–20https://doi.org/10.1145/3457909

Advances on differentiating between malicious intent and natural “organizational evolution” to explain observed anomalies in operational workplace patterns suggest benefit from evaluating collective behaviors observed in the facilities to improve insider ...

research-article
Open Access
Simulating Organizational Data from Redacted Input for Inference Enterprise Modeling
Article No.: 4, Pages 1–30https://doi.org/10.1145/3457910

Organizations that use data to assess insider threats, or other workforce outcomes, need to evaluate the quality of their assessment methods. This evaluation relies on an accurate representation of the predictors and criterion variables within the ...

research-article
Open Access
Using Dirichlet Marked Hawkes Processes for Insider Threat Detection
Article No.: 5, Pages 1–19https://doi.org/10.1145/3457908

Malicious insiders cause significant loss to organizations. Due to an extremely small number of malicious activities from insiders, insider threat is hard to detect. In this article, we present a Dirichlet Marked Hawkes Process (DMHP) to detect malicious ...

SECTION: Regular Papers
research-article
Open Access
Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange
Article No.: 6, Pages 1–22https://doi.org/10.1145/3458027

For a strong, collective defense in the digital domain, we need to produce, consume, analyze, and share cyber threat intelligence. With an increasing amount of available information, we need automation to ensure adequate efficiency. We present the results ...

research-article
Open Access
Privacy-aware Character Pattern Matching over Outsourced Encrypted Data
Article No.: 7, Pages 1–38https://doi.org/10.1145/3462333

Providing a method to efficiently search into outsourced encrypted data, without forsaking strong privacy guarantees, is a pressing concern rising from the separation of data ownership and data management typical of cloud-based applications. While several ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.