Insider threat detection for specific threat scenarios
Abstract Insider threats pose significant challenges to network security due to their destructive and covert nature, often resulting in substantial losses for enterprises. Traditional methods mainly analyze user behavior patterns or convert behaviors into time sequences for further analysis. However...
Saved in:
| Main Authors: | Tian Tian, Chen Zhang, Bo Jiang, Huamin Feng, Zhigang Lu |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
SpringerOpen
2025-03-01
|
| Series: | Cybersecurity |
| Subjects: | |
| Online Access: | https://doi.org/10.1186/s42400-024-00321-w |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Study on user behavior profiling in insider threat detection
by: Yuanbo GUO, et al.
Published: (2018-12-01) -
A Review of the Insider Threat, a Practitioner Perspective Within the U.K. Financial Services
by: Findlay Whitelaw, et al.
Published: (2024-01-01) -
Business process mining based insider threat detection system
by: Tai-ming ZHU, et al.
Published: (2016-10-01) -
A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods
by: Fatima Rashed Alzaabi, et al.
Published: (2024-01-01) -
Daily insider threat detection with hybrid TCN transformer architecture
by: Xiaoyun Ye, et al.
Published: (2025-08-01)