Privacy-Preserving String Comparisons in Record Linkage Systems: A Review
Information Security Journal: A Global Perspective
Developing insider attack detection model: a grounded approach
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Ontological semantic technology for detecting insider threat and social engineering
Proceedings of the 2010 workshop on New security paradigms
An ecological approach to anomaly detection: the EIA model
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
Understanding insiders: An analysis of risk-taking behavior
Information Systems Frontiers
Semantic security against web application attacks
Information Sciences: an International Journal
Hi-index | 0.00 |
Organizations must implement effective training to raise staff awareness about insider threats and the need for organizations to adopt a more effective approach to identifying potential risks and then taking proactive steps to mitigate them.