Main Page

From Insider Threat Detection
Revision as of 14:08, 6 April 2016 by Ychung (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
Insider Threat Analysis

Members

Dataset

CERT

System Architecture

Minutes


Approaches

Insider Threat Detection using kNN on Session Feature Vectors

Literature

Survey Works

Distance-Based Detection


Graph-Based Approach

Learning-Based Approach

  • Supervised Learning for Insider Threat Detection Using Stream Mining, Pallabi Parveen, Zackary R Weger, Bhavani Thuraisingham, Kevin Hamlen and Latifur Khan, Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on , vol., no., pp.1102,1110, 9-11 Oct. 2011

Clustering-Based Approach

Case-Study