Learning from Access Log to Mitigate Insider Threats
As the quantity of data collected, stored, and processed in information systems has grown, so too have insider threats. This type of threat is realized when authorized individuals misuse their privileges to violate privacy or security policies. Over the past several decades, various technologies hav...
Main Author: | Zhang, Wen |
---|---|
Other Authors: | Carl Gunter |
Format: | Others |
Language: | en |
Published: |
VANDERBILT
2016
|
Subjects: | |
Online Access: | http://etd.library.vanderbilt.edu/available/etd-03152016-201532/ |
Similar Items
-
Framework of human behavior to mitigate the insider threat
by: Badawi, Jihad Wajeeh
Published: (2013) -
The accessibility of insider threats on a corporate network
by: Denison, Stephen
Published: (2015) -
Mitigating Insider Threats Using Bio-Inspired Models
by: Andreas Nicolaou, et al.
Published: (2020-07-01) -
Insider threat risk management framework
by: Mohd. Ambar, Mohd. Hafiz
Published: (2012) -
A Study on Insider Threat Dynamics and Mitigating Insider Threats Using Correlation of Security Alerts
by: Chou, Wen-Hsiang, et al.
Published: (2009)