"A Multi-Leveled Approach to Intrusion Detection and the Insider Threat"
written by Rita M. Barrios,
published by Journal of Information Security, Vol.4 No.1, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Insider Threats: Detecting and Controlling Malicious Insiders
[2] PRI: Privacy Preserving Inspection of Network Traffic
[3] A Case Study: Factors that Influence Well-Meaning Insiders' Perception, Judgment, and Actions Related to Information Security
[4] Advanced Methods to Detect Intricate Cybersecurity Exploits: An Exploratory Qualitative Inquiry
[5] Workplace Monitoring and Its Effects on Leadership Perceptions of Employee Productivity in Higher Education: An Exploratory Inquiry
[6] Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
ProQuest Dissertations Publishing, 2018
[7] AnyThreat: An Opportunistic Knowledge Discovery Approach to Insider Threat Detection
[8] The Persistent Insider Threat: Is Enough Being Done?
ISACA Journal, 2017
[9] Defending against malicious insiders: a conceptual framework for predicting, detecting, and deterring malicious insiders
International Journal of Business Process Integration and Management, 2017
International Journal of Computer Networks & Communications, 2017
[11] Cybersecurity Policy: Exploring Leadership Strategies that Influence Insider Compliance
ProQuest Dissertations Publishing, 2017
[12] Outlier Detection in Random Subspaces over Data Streams: An Approach for Insider Threat Detection
[13] PRI: Privacy Preserving Inspection of Encrypted Network Traffic
arXiv preprint arXiv:1604.04465, 2016
[14] Student Information Security Behaviors and Attitudes at a Private Liberal Arts University in the Southeastern United States
ProQuest Dissertations Publishing, 2016
[15] Data breaches: Confidential data loss by organizations through security vulnerabilities
ProQuest Dissertations Publishing, 2015
[16] Insider Threats: Detecting and Controlling
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 2015
[17] The Trusted Shadow and Trojan Horse of the United States Government
Journal Article| March, 2014
[18] Financial System Analysis and Research of OLAP and Data Warehouse Technology
Information Technology Journal, 2014
[19] Protecting and Preserving Mechanisms of DBMS against Insider Threat
MV Jawalge, E Schallehn, MSS Barthel - wwwiti.cs.uni-magdeburg.de, 2013