Cargando…
Techniques and countermeasures for preventing insider threats
With the wide use of technologies nowadays, various security issues have emerged. Public and private sectors are both spending a large portion of their budget to protect the confidentiality, integrity, and availability of their data from possible attacks. Among these attacks are insider attacks whic...
Autores principales: | Alsowail, Rakan A., Al-Shehari, Taher |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9044369/ https://www.ncbi.nlm.nih.gov/pubmed/35494800 http://dx.doi.org/10.7717/peerj-cs.938 |
Ejemplares similares
-
An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques
por: Al-Shehari, Taher, et al.
Publicado: (2021) -
Enemy at the water cooler: real-life stories of insider threats and Enterprise Security Management countermeasures
por: Contos, Brian T
Publicado: (2006) -
A systematic review on hand gesture recognition techniques, challenges and applications
por: Yasen, Mais, et al.
Publicado: (2019) -
Mobile data loss: threats and countermeasures
por: Raggo, Michael T
Publicado: (2016) -
Evaluation of feature projection techniques in object grasp classification using electromyogram signals from different limb positions
por: Thiamchoo, Nantarika, et al.
Publicado: (2022)