A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
SoK: A Systematic Review of Insider Threat Detection
2019
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
Due to the subtle nature of the insider threat, government bodies and corporate organizations are forced to face the insider threat that is both malicious and accidental. In this paper, we provide a systematic understanding of the past literature that addresses the issues with insider threat detection. Our review consists of three items. First, we examine the different types of insider threats based on insider characteristics and insider activities. Second, we explore the sensors which make
doi:10.22667/jowua.2019.12.31.046
dblp:journals/jowua/KimORLKL19
fatcat:qdw2eruvijhdjc3qsiit6yblda