Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleDecember 2013
Can We Trust This User? Predicting Insider's Attitude via YouTube Usage Profiling
UIC-ATC '13: Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence & Computing and 2013 IEEE 10th International Conference on Autonomic & Trusted ComputingPages 347–354https://doi.org/10.1109/UIC-ATC.2013.12Addressing the insider threat is a major issue in cyber and corporate security in order to enhance trusted computing in critical infrastructures. In this paper we study the psychosocial perspective and the implications of insider threat prediction via ...
- research-articleNovember 2013
Proactive insider threat detection through social media: the YouTube case
WPES '13: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic societyPages 261–266https://doi.org/10.1145/2517840.2517865Insider threat is a major issue in cyber and corporate security. In this paper we study the psychosocial perspective of the insider via social media, Open Source Intelligence, and user generated content classification. Inductively, we propose a ...
- book-reviewFebruary 2013
- articleFebruary 2013
- ArticleJune 2011
Exploitation of auctions for outsourcing security-critical projects
ISCC '11: Proceedings of the 2011 IEEE Symposium on Computers and CommunicationsPages 646–651https://doi.org/10.1109/ISCC.2011.5983912ICT outsourcing may introduce several risks. This paper attempts to mitigate this problem by applying an auctioning scheme. By adopting the scheme, the involved organization selects one or more potential outsourced service providers via an auction ...
- ArticleAugust 2010
An insider threat prediction model
Information systems face several security threats, some of which originate by insiders. This paper presents a novel, interdisciplinary insider threat prediction model. It combines approaches, techniques, and tools from computer science and psychology. ...