The Wolf of SUTD (TWOS): A dataset of malicious insider threat behavior based on a gamified competition

In this paper we present open research questions and options for data analysis of our previously designed dataset called TWOS: The Wolf of SUTD. In specified research questions, we illustrate the potential use of the TWOS dataset in multiple areas of cyber security, which does not limit only to mali...

Full description

Autores:
Tipo de recurso:
Fecha de publicación:
2018
Institución:
Universidad del Rosario
Repositorio:
Repositorio EdocUR - U. Rosario
Idioma:
eng
OAI Identifier:
oai:repository.urosario.edu.co:10336/22495
Acceso en línea:
https://doi.org/10.22667/JOWUA.2018.03.31.054
https://repository.urosario.edu.co/handle/10336/22495
Palabra clave:
Authorship verification
Continuous authentication
Feature extraction
Malicious insider threat
Masquerader
Multiplayer game
Sentiment analysis
Traitor
User behavior monitoring
Rights
License
Abierto (Texto Completo)