Proceedings of the 2017 International Workshop on Managing Insider Security Threats 2017
DOI: 10.1145/3139923.3139930
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 29 publications
0
10
0
Order By: Relevance
“…The varSelRF and Boruta algorithms achieved similar performances. 2017) did because they distinguished the types of scenario that the subjects faced [51]. They tried to classify different kinds of tasks, while we tried to classify two kinds of scenarios with similar structures and lengths.…”
Section: Resultsmentioning
confidence: 99%
“…The varSelRF and Boruta algorithms achieved similar performances. 2017) did because they distinguished the types of scenario that the subjects faced [51]. They tried to classify different kinds of tasks, while we tried to classify two kinds of scenarios with similar structures and lengths.…”
Section: Resultsmentioning
confidence: 99%
“…They extracted features from those signals and used them to train classifiers, such as support vector machine (SVM), k-nearest neighbor (KNN), and random forest (RF), to distinguish between anomalous and benign activities. Both experimental results showed that EEG signals can reveal valuable information about a user's malicious intent and can be used as an effective indicator in designing real-time insider threat monitoring and detection frameworks [ 25 ].…”
Section: Related Workmentioning
confidence: 96%
“…A body of research has focused on detecting anomalous behaviors in some interesting ways. References [ 25 ] and [ 26 ] conducted multimodel neurophysiological assessments to learn how users' brains act when the user is performing abnormal and normal activities. In particular, they focused on using electroencephalogram (EEG) signals that arise from the user's brain activities and eye tracking, which can capture spontaneous responses that are unfiltered by the conscious mind [ 25 ].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations