{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:52:34Z","timestamp":1730271154141,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/isba.2018.8311479","type":"proceedings-article","created":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T17:55:07Z","timestamp":1520877307000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Prediction of human error using eye movements patterns for unintentional insider threat detection"],"prefix":"10.1109","author":[{"given":"Hassan","family":"Takabi","sequence":"first","affiliation":[]},{"given":"Yessir","family":"Hashem","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Dantu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Insider threat detection based on users' mouse movements and keystrokes behavior","author":"hashem","year":"2017","journal-title":"Proceedings of the Secure Knowledge Management Conference 2017 (SKM 2017)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3139923.3139930"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2808783.2808792"},{"key":"ref13","first-page":"20","article-title":"Inside the mind of the insider: Towards insider threat detection using psychophysiological signals","volume":"6","author":"hashem","year":"2016","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1743666.1743712"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SIITME.2015.7342312"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813660"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77322-3_2"},{"key":"ref19","first-page":"113","article-title":"End of an error","volume":"47","author":"pond","year":"2003","journal-title":"Security Management"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23203"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572542"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.07.029"},{"journal-title":"The cost of an unintentional insider threat","article-title":"Forcepoint LLC","year":"2017","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2014.39"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.256"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.02.017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-0437-8_9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1212\/WNL.25.11.1065"},{"key":"ref20","first-page":"1","article-title":"Csi computer crime and security survey","volume":"1","author":"richardson","year":"2008","journal-title":"Computer Security Institute"},{"key":"ref22","article-title":"The relationship between eye movement and vision develops before birth","volume":"8","author":"sch\u00f6pf","year":"2014","journal-title":"Frontiers in Human Neuroscience"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374580"},{"key":"ref24","article-title":"Unintentional insider threats: social engineering","author":"team","year":"2014","journal-title":"Software Engineering Institute"},{"key":"ref23","article-title":"Unintentional insider threats: A foundational study","author":"team","year":"2013","journal-title":"Software Engineering Institute Technical Report"},{"journal-title":"Verizon Enterprise Verizon data breach investigations reports","year":"2017","key":"ref26"},{"journal-title":"Tobii pro x2–60 eye tracker","year":"2016","key":"ref25"}],"event":{"name":"2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA)","start":{"date-parts":[[2018,1,11]]},"location":"Singapore","end":{"date-parts":[[2018,1,12]]}},"container-title":["2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8306019\/8311454\/08311479.pdf?arnumber=8311479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T16:43:41Z","timestamp":1522687421000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8311479\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/isba.2018.8311479","relation":{},"subject":[],"published":{"date-parts":[[2018,1]]}}}