Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/67962
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lai, Rachel | - |
dc.date.accessioned | 2016-05-23T08:35:05Z | - |
dc.date.available | 2016-05-23T08:35:05Z | - |
dc.date.issued | 2016 | - |
dc.identifier.uri | http://hdl.handle.net/10356/67962 | - |
dc.description.abstract | The objective of this project is to come up with ways to recognize insider threats. An insider threat comes from within an organization where people such as former or current employees or business associates intend to inflict harm on the company. It is advantageous to be able to identify a person’s ill intentions before it takes place. Thus this project focuses on analyzing the dynamics and networks of a company through its email exchanges. With the usage of R programming and Gephi, anomalies or unusual behaviour are identified and sought out. These anomalies may lead to uncovering an insider threat. | en_US |
dc.format.extent | 50 p. | en_US |
dc.language.iso | en | en_US |
dc.rights | Nanyang Technological University | - |
dc.subject | DRNTU::Engineering | en_US |
dc.title | Detecting insider threats | en_US |
dc.type | Final Year Project (FYP) | en_US |
dc.contributor.supervisor | Tan Yap Peng | en_US |
dc.contributor.school | School of Electrical and Electronic Engineering | en_US |
dc.description.degree | Bachelor of Engineering | en_US |
item.fulltext | With Fulltext | - |
item.grantfulltext | restricted | - |
Appears in Collections: | EEE Student Reports (FYP/IA/PA/PI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FYPFinalRachel.pdf Restricted Access | 12.84 MB | Adobe PDF | View/Open |
Page view(s)
260
Updated on Mar 28, 2024
Download(s)
13
Updated on Mar 28, 2024
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.