supported in part by National Key Research and Development Program of China(Grant No.2018YFB1700403);National Natural Science Foundation of China(Grant Nos.61872388,62072470);Natural Science Foundation of Hunan Province(Grant No.2020JJ4758);ITD-2018 project at Github:https://github.com/csuvis/Insider Threat Data。
Dear editor,Malicious insiders are trusted entities that are given the power to violate rules in a given security policy,and insider threats occur when trusted entities abuse such a power.In modern networked work envi...
Project supported by the Information Engineering University Emerging Direction Cultivation Fund,China(No.2016610708);the Science and Technology Research Project of Henan,China(No.172102210615);the National Natural Science Foundation of China(Nos.61521003 and 61602509);the National Key Research and Development Program of China(Nos.2016YFB0800100 and 2016YFB0800101)
Although the perimeter security model works well enough when all internal hosts are credible, it is becoming increasingly difficult to enforce as companies adopt mobile and cloud technologies, i.e., the rise of bring ...