- Home
- Publications
- Publication Search
- Publication Details
Title
A Multi-Tiered Framework for Insider Threat Prevention
Authors
Keywords
-
Journal
Electronics
Volume 10, Issue 9, Pages 1005
Publisher
MDPI AG
Online
2021-04-23
DOI
10.3390/electronics10091005
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Edge‐based blockchain enabled anomaly detection for insider attack prevention in Internet of Things
- (2020) Yusuf Muhammad Tukur et al. Transactions on Emerging Telecommunications Technologies
- PRISER: Managing Notification in Multiples Devices with Data Privacy Support
- (2019) Luis Augusto Silva et al. SENSORS
- PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices
- (2019) Daniel A. F. Saraiva et al. SENSORS
- Detecting and Preventing Cyber Insider Threats: A Survey
- (2018) Liu Liu et al. IEEE Communications Surveys and Tutorials
- Micromovement Behavior as an Intention Detection Measurement for Preventing Insider Threats
- (2018) Abdulaziz Almehmadi IEEE Access
- An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks
- (2018) Taher Al-Shehari et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC)
- (2017) Abdulaziz Almehmadi et al. IEEE Systems Journal
- Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
- (2017) Philip A. Legg et al. IEEE Systems Journal
- G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework
- (2017) Nathalie Baracaldo et al. IEEE Transactions on Dependable and Secure Computing
- Looks Like Eve
- (2016) Simon Eberz et al. ACM Transactions on Privacy and Security
- Eeglab – an Open Source Matlab Toolbox for Electrophysiological Research
- (2013) Clemens Brunner et al. Biomedical Engineering-Biomedizinische Technik
- Detecting Anomalous Insiders in Collaborative Information Systems
- (2012) You Chen et al. IEEE Transactions on Dependable and Secure Computing
- Insider threat mitigation: preventing unauthorized knowledge acquisition
- (2012) Qussai Yaseen et al. International Journal of Information Security
- Understanding compliance with internet use policy from the perspective of rational choice theory
- (2009) Han Li et al. DECISION SUPPORT SYSTEMS
- A survey of autonomic computing—degrees, models, and applications
- (2008) Markus C. Huebscher et al. ACM COMPUTING SURVEYS
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started