Insider Threat Event Detection in User-System Interactions
Detection of insider threats relies on monitoring individuals and their interactions with organizational resources. Identification of anomalous insiders typically relies on supervised learning models that use labeled data. However, such labeled data is not easily obtainable. The labeled data that do...
Autor Principal: | Moriano Salazar, Pablo Andrés; Pendleton, Jared; Rich, Steven; Camp, L. Jean |
---|---|
Formato: | Artículo (Article) |
Lenguaje: | Desconocido (Unknown) |
Publicado: |
Proceedings of the 2017 International Workshop on Managing Insider Security Threats
2017
|
Materias: | |
Acceso en línea: | http://babel.banrepcultural.org/cdm/ref/collection/p17054coll23/id/819 |
Ejemplares similares
-
Detection of masqueraders based on graph partitioning of file system access events
por: Toffalini F., et al.
Publicado: (2018) -
Factors in an End User Security Expertise Instrument
por: Moriano Salazar, Pablo Andrés; Rajivan, Prashant; Kelley, Timothy; Camp, L. Jean
Publicado: (2017) -
What Can Johnny Do? - Factors in an End-User Expertise Instrument
por: Moriano Salazar, Pablo Andrés; Rajivan, Prashant; Kelley, Timothy; Camp, L. Jean
Publicado: (2016) -
Model-Based Fraud Detection in Growing Networks
por: Moriano Salazar, Pablo Andrés; Finke, Jorge
Publicado: (2014) -
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies
por: Moriano Salazar, Pablo Andrés; Achar, Soumya; Camp, L. Jean
Publicado: (2017)