2022 IEEE International Systems Conference (SysCon) 2022
DOI: 10.1109/syscon53536.2022.9773890
|View full text |Cite
|
Sign up to set email alerts
|

Creating a Digital Twin of an Insider Threat Detection Enterprise Using Model-Based Systems Engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…They may also have a thorough grasp of the system's security rules and methods, allowing them to circumvent its security features quickly. Many non-blockchain-based studies [36][37][38][39][40][41][42][43][44][45][46][47][48][49][50] for detecting insider threat have been conducted. However, our focus in this survey is on blockchain-based data breach detection studies.…”
Section: Comprehensive Reviewmentioning
confidence: 99%
“…They may also have a thorough grasp of the system's security rules and methods, allowing them to circumvent its security features quickly. Many non-blockchain-based studies [36][37][38][39][40][41][42][43][44][45][46][47][48][49][50] for detecting insider threat have been conducted. However, our focus in this survey is on blockchain-based data breach detection studies.…”
Section: Comprehensive Reviewmentioning
confidence: 99%
“…2, challenges and opportunities need to be taken into account when deciding on capabilities. However, most studies published to showcase UAF implementation do not consider these strategic elements and directly determine capabilities either by the operational concept [1], [20], goals [3], [9], [11], or requirements [5], [8], [10], [21]. This is due to the lack of an established process for identifying capabilities from these elements.…”
Section: Figurementioning
confidence: 99%