Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"A Multi-Leveled Approach to Intrusion Detection and the Insider Threat"
written by Rita M. Barrios,
published by Journal of Information Security, Vol.4 No.1, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Insider Threats: Detecting and Controlling Malicious Insiders
[2] PRI: Privacy Preserving Inspection of Network Traffic
[3] ENHANCED HIDDEN MARKOV MODELS (HMMs) FOR REAL-TIME FRAUD DETECTION IN ELECTRONIC BANKING
2022
[4] Assessing Insider Threat Intentions: A Multiple Case Study Using Protection Motivation Theory
2022
[5] ASSESSING PRACTICE OF INFORMATION TECHNOLOGY AUDIT AND FRAUD DETECTION ON COMMERCIAL BANKS IN ETHIOPIA
2021
[6] Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
2020
[7] Future Insider Threats: A Delphi Analysis
2019
[8] A Case Study: Factors that Influence Well-Meaning Insiders' Perception, Judgment, and Actions Related to Information Security
2019
[9] Advanced Methods to Detect Intricate Cybersecurity Exploits: An Exploratory Qualitative Inquiry
2019
[10] Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
ProQuest Dissertations Publishing, 2018
[11] AnyThreat: An Opportunistic Knowledge Discovery Approach to Insider Threat Detection
2018
[12] Workplace Monitoring and Its Effects on Leadership Perceptions of Employee Productivity in Higher Education: An Exploratory Inquiry
2018
[13] Opportunistic machine learning methods for effective insider threat detection
2018
[14] A Technical Solution to Insider Threat Prevention
2017
[15] The Persistent Insider Threat: Is Enough Being Done?
ISACA Journal, 2017
[16] Defending against malicious insiders: a conceptual framework for predicting, detecting, and deterring malicious insiders
International Journal of Business Process Integration and Management, 2017
[17] DISCOVERING NEW CYBER PROTECTION APPROACHES FROM ASecurity PROFESSIONAL PROSPECTIVE
International Journal of Computer Networks & Communications, 2017
[18] Cybersecurity Policy: Exploring Leadership Strategies that Influence Insider Compliance
ProQuest Dissertations Publishing, 2017
[19] Discovering new cyber protection approaches from a security professional prospective
2017
[20] Outlier Detection in Random Subspaces over Data Streams: An Approach for Insider Threat Detection
2017
[21] PRI: Privacy Preserving Inspection of Encrypted Network Traffic
arXiv preprint arXiv:1604.04465, 2016
[22] Latency in intrusion detection systems (IDS) and cyber-attacks: A quantitative comparative study
2016
[23] Student Information Security Behaviors and Attitudes at a Private Liberal Arts University in the Southeastern United States
ProQuest Dissertations Publishing, 2016
[24] Data breaches: Confidential data loss by organizations through security vulnerabilities
ProQuest Dissertations Publishing, 2015
[25] Insider Threats: Detecting and Controlling
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 2015
[26] The Trusted Shadow and Trojan Horse of the United States Government
Journal Article| March, 2014
[27] Financial System Analysis and Research of OLAP and Data Warehouse Technology
Information Technology Journal, 2014
[28] Protecting and Preserving Mechanisms of DBMS against Insider Threat
MV Jawalge, E Schallehn, MSS Barthel - wwwiti.cs.uni-magdeburg.de, 2013
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top