Topics of interest include but are not limited to:
- insider threat indicator development
- data collection, aggregation, and correlation for threat indicators
- data collection of baseline user data and behaviors
- analytic approaches that address key challenges such as reducing false positives
- novel techniques/new technologies for prevention, detection, and response to insider attacks
- predictive analytics for identifying potential indicators of insider threat
- linguistic approaches to identifying potential behavior of concern
- insider attacker behavioral models and analysis
- adversarial and game theoretic models of insider threats and attacks
- evaluation, experimentation and risk assessment of insider threat detection approaches
- mobile devices and insider threats
- social networking and insider threats
- identifying unknown insider attack patterns
- sociotechnical approaches to protecting against insider threat attacks
- biometric approaches for identifying potential insider threat behavior.
- application of solutions from other domains to address insider threats
- unintentional insider threats
- research directions addressing privacy and security
留言