Zobrazeno 1 - 10
of 420
pro vyhledávání: '"insider threats"'
Publikováno v:
BMC Medical Informatics and Decision Making, Vol 24, Iss 1, Pp 1-19 (2024)
Abstract Background Anomaly detection is crucial in healthcare data due to challenges associated with the integration of smart technologies and healthcare. Anomaly in electronic health record can be associated with an insider trying to access and man
Externí odkaz:
https://doaj.org/article/d88a24f4b113479298aafdc626462e15
Autor:
Padayachee, Keshnee
Publikováno v:
Information & Computer Security, 2024, Vol. 32, Issue 3, pp. 344-364.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-04-2023-0069
On Identification of Intrusive Applications: A Step Toward Heuristics-Based Adaptive Security Policy
Publikováno v:
IEEE Access, Vol 12, Pp 37586-37599 (2024)
Android is widely recognized as one of the leading mobile operating systems globally. As the popularity and usage of Android OS and third-party application stores continue to soar, the process of developing and publishing applications has become incr
Externí odkaz:
https://doaj.org/article/4cd2a721343e4558bc613c0c9005ef02
Publikováno v:
IEEE Access, Vol 12, Pp 30242-30253 (2024)
This paper explores the analysis of user behavior in information systems through audit records, creating a behavior model represented as a graph. The model captures actions over a specified period, facilitating real-time comparison to identify inside
Externí odkaz:
https://doaj.org/article/fae556af3f7f44869996db7bda93c864
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Heliyon, Vol 9, Iss 3, Pp e13822- (2023)
In the past, aviation security regulations have mostly been reactive, responding to terrorist attacks by adding more stringent measures. In combination with the standardization of security control processes, this has resulted in a more predictable sy
Externí odkaz:
https://doaj.org/article/562c8840000a4b02a59e881f41c74459
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
South African Journal of Information Management, Vol 24, Iss 1, Pp e1-e8 (2022)
Background: Cybersecurity breaches have become a growing challenge in today’s digital economy. Organisations are faced with the responsibility of protecting their information resources from cybersecurity threats, and insider threats are one of them
Externí odkaz:
https://doaj.org/article/280e46b498a3474f8650ee0db43a2827
Autor:
Ahmed Y. Al Hammadi, Dongkun Lee, Chan Yeob Yeun, Ernesto Damiani, Song-Kyoo Kim, Paul D. Yoo, Ho-Jin Choi
Publikováno v:
IEEE Access, Vol 8, Pp 206222-206234 (2020)
The loss or compromise of any safety critical industrial infrastructure can seriously impact the confidentiality, integrity, or delivery of essential services. Research has shown that such threats often come from malicious insiders. To identify these
Externí odkaz:
https://doaj.org/article/eb0b418cf174403581e3d5069f62ec53
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.