The Wolf of SUTD (TWOS): A dataset of malicious insider threat behavior based on a gamified competition
In this paper we present open research questions and options for data analysis of our previously designed dataset called TWOS: The Wolf of SUTD. In specified research questions, we illustrate the potential use of the TWOS dataset in multiple areas of cyber security, which does not limit only to mali...
- Autores:
- Tipo de recurso:
- Fecha de publicación:
- 2018
- Institución:
- Universidad del Rosario
- Repositorio:
- Repositorio EdocUR - U. Rosario
- Idioma:
- eng
- OAI Identifier:
- oai:repository.urosario.edu.co:10336/22495
- Acceso en línea:
- https://doi.org/10.22667/JOWUA.2018.03.31.054
https://repository.urosario.edu.co/handle/10336/22495
- Palabra clave:
- Authorship verification
Continuous authentication
Feature extraction
Malicious insider threat
Masquerader
Multiplayer game
Sentiment analysis
Traitor
User behavior monitoring
- Rights
- License
- Abierto (Texto Completo)