2018
DOI: 10.1007/978-3-319-94782-2_1
|View full text |Cite
|
Sign up to set email alerts
|

A Simulation-Based Approach to Development of a New Insider Threat Detection Technique: Active Indicators

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Heuristic-based insider threat detection approaches in [82], [83] present proactive ways to identifying potential malicious activities by establishing a set of rules, guidelines, or heuristics that define normal behavior within an organization's network or information systems. Unlike signature-based detection, which relies on predefined patterns, heuristic-based methods focus on recognizing deviations from established norms.…”
Section: ) Heuristic-based Detection Methodsmentioning
confidence: 99%
“…Heuristic-based insider threat detection approaches in [82], [83] present proactive ways to identifying potential malicious activities by establishing a set of rules, guidelines, or heuristics that define normal behavior within an organization's network or information systems. Unlike signature-based detection, which relies on predefined patterns, heuristic-based methods focus on recognizing deviations from established norms.…”
Section: ) Heuristic-based Detection Methodsmentioning
confidence: 99%
“…For example, the perfection of neuroergonomic techniques might materialize thought into action, all in a moment. Here, a stray idea or passing fancy is then enacted, even if the individual regrets such thoughts almost he moment they have them (Yerdon et al, 2018; Matthews et al, 2019). Connections here to advanced weaponry will render the outcome of some such actions as irreversible.…”
Section: The Dangers Of Turning the Mind Inside-outmentioning
confidence: 99%