{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:22:06Z","timestamp":1760239326460,"version":"build-2065373602"},"reference-count":58,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>This study proposes a scheme to identify insider threats in nuclear facilities through the detection of malicious intentions of potential insiders using subject-wise classification. Based on electroencephalography (EEG) signals, a classification model was developed to identify whether a subject has a malicious intention under scenarios of being forced to become an insider threat. The model also distinguishes insider threat scenarios from everyday conflict scenarios. To support model development, 21-channel EEG signals were measured on 25 healthy subjects, and sets of features were extracted from the time, time\u2013frequency, frequency and nonlinear domains. To select the best use of the available features, automatic selection was performed by random-forest-based algorithms. The k-nearest neighbor, support vector machine with radial kernel, na\u00efve Bayes, and multilayer perceptron algorithms were applied for the classification. By using EEG signals obtained while contemplating becoming an insider threat, the subject-wise model identified malicious intentions with 78.57% accuracy. The model also distinguished insider threat scenarios from everyday conflict scenarios with 93.47% accuracy. These findings could be utilized to support the development of insider threat mitigation systems along with existing trustworthiness assessments in the nuclear industry.<\/jats:p>","DOI":"10.3390\/s20216365","type":"journal-article","created":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T19:03:37Z","timestamp":1604862217000},"page":"6365","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["An Investigation of Insider Threat Mitigation Based on EEG Signal Classification"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6903-6771","authenticated-orcid":false,"given":"Jung Hwan","family":"Kim","sequence":"first","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Department of Nuclear and Quantum Engineering, Daejeon 34141, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7405-6600","authenticated-orcid":false,"given":"Chul Min","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Department of Nuclear and Quantum Engineering, Daejeon 34141, Korea"}]},{"given":"Man-Sung","family":"Yim","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Department of Nuclear and Quantum Engineering, Daejeon 34141, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"ref_1","unstructured":"IAEA (2015). Self-Assessment of Nuclear Security Culture in Facilities and Activities, IAEA."},{"key":"ref_2","unstructured":"IAEA (2016). IAEA Incident and Trafficking Database (ITDB) Incidents of Nuclear and Other Radioactive Material Out of Regulatory Control, International Atomic Energy Agency. 2016 Fact Sheet."},{"key":"ref_3","unstructured":"IAEA (2008). Preventive and Protective Measures against Insider Threats, IAEA."},{"key":"ref_4","unstructured":"Bunn, M., and Sagan, S.D. (2014). A Worst Practices Guide to Insider Threats: Lessons from Past Mistakes, American Academy of Arts and Sciences."},{"key":"ref_5","unstructured":"Hobbs, C., and Moran, M. (2015). Insider Threats: An Educational Handbook of Nuclear & Non-Nuclear Case Studies, King\u2019s College London."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.anucene.2017.05.006","article-title":"A study of insider threat in nuclear security analysis using game theoretic modeling","volume":"108","author":"Kim","year":"2017","journal-title":"Ann. Nucl. Energy"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/j.pnucene.2017.08.006","article-title":"Insider threats of physical protection systems in nuclear power plants: Prevention and evaluation","volume":"104","author":"Zou","year":"2018","journal-title":"Prog. Nucl. Energy"},{"key":"ref_8","unstructured":"IAEA (2008). Nuclear Security Culture, IAEA."},{"key":"ref_9","unstructured":"WINS (2016). Nuclear Security Culture, WINS. A World Institute for Nuclear Security International Best Practice Guide."},{"key":"ref_10","unstructured":"Hirsch, D. (1987). The truck bomb and insider threats to nuclear facilities. Preventing Nuclear Terrorism: The Report and Papers of the International Task Force on Prevention of Nuclear Terrorism, Lexington Books."},{"key":"ref_11","unstructured":"Bunn, M. (2020, November 08). Scenarios of Insider Threats to Japan\u2019s Nuclear Facilities and Materials - and Steps to Strengthen Protection. Available online: https:\/\/nautilus.org\/napsnet\/napsnet-special-reports\/scenarios-of-insider-threats-to-japans-nuclear-facilities-and-materials-and-steps-to-strengthen-protection."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Greitzer, F., Purl, J., Leong, Y.M., and Becker, D.S. (2018, January 24). Sofit: Sociotechnical and organizational factors for insider threat. Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA.","DOI":"10.1109\/SPW.2018.00035"},{"key":"ref_13","first-page":"4","article-title":"Insiders and insider threats-an overview of definitions and mitigation techniques","volume":"2","author":"Hunker","year":"2011","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Greitzer, F.L., Kangas, L.J., Noonan, C.F., Dalton, A.C., and Hohimer, R.E. (2012, January 4\u20137). Identifying at-risk employees: Modeling psychosocial precursors of potential insider threats. Proceedings of the 2012 45th Hawaii International Conference on System Sciences, Maui, HI, USA.","DOI":"10.1109\/HICSS.2012.309"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1016\/j.anucene.2017.11.030","article-title":"\u201cHigh risk non-initiating insider\u201d identification based on EEG analysis for enhancing nuclear security","volume":"113","author":"Suh","year":"2018","journal-title":"Ann. Nucl. Energy"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1109\/JSYST.2015.2424677","article-title":"On the possibility of insider threat prevention using intent-based access control (IBAC)","volume":"11","author":"Almehmadi","year":"2015","journal-title":"IEEE Syst. J."},{"key":"ref_17","unstructured":"USNRC (2016). Summary of NRC staff program review of 10 CFR Part 37. Program Review Team United States Nuclear Regulatory Commission, USNRC."},{"key":"ref_18","unstructured":"USNRC (2002). Fitness for duty\u2014Continual behavior observation program. Point Beach Nuclear Plant Procedures Manual, USNRC."},{"key":"ref_19","unstructured":"Davies, G.M., and Beech, A.R. (2012). Forensic Psychology: Crime, Justice, Law, Interventions, John Wiley & Sons."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Bunn, M., and Sagan, S.D. (2017). Insider Threats, Cornell University Press.","DOI":"10.7591\/9781501705946"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1080\/00036810500130539","article-title":"Harmony, hierarchy and conservatism: A cross-cultural comparison of Confucian values in China, Korea, Japan, and Taiwan","volume":"22","author":"Zhang","year":"2005","journal-title":"Commun. Res. Rep."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Almehmadi, A., and El-Khatib, K. (2014, January 9\u201311). On the possibility of insider threat detection using physiological signal monitoring. Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, UK.","DOI":"10.1145\/2659651.2659654"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"40626","DOI":"10.1109\/ACCESS.2018.2857450","article-title":"Micromovement behavior as an intention detection measurement for preventing insider threats","volume":"60","author":"Almehmadi","year":"2018","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Hashem, Y., Takabi, H., Ghasemigol, M., and Dantu, R. (2015, January 12\u201316). Towards insider threat detection using psychophysiological signals. Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, Denver, CO, USA.","DOI":"10.1145\/2808783.2808792"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Noonan, C.F. (2018). Spy the Lie: Detecting Malicious Insiders, Pacific Northwest National Lab. PNNL.","DOI":"10.2172\/1452870"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2535","DOI":"10.1109\/TCYB.2015.2479240","article-title":"EEG-based classification of implicit intention during self-relevant sentence reading","volume":"46","author":"Dong","year":"2015","journal-title":"IEEE Trans. Cybern."},{"key":"ref_27","unstructured":"Butcher, J. (1989). Minnesota Multiphasic Personality Inventory-2 User\u2019s Guide, National Computer Systems."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.patrec.2015.06.013","article-title":"Human implicit intent recognition based on the phase synchrony of EEG signals","volume":"66","author":"Kang","year":"2015","journal-title":"Pattern Recognit. Lett."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"376","DOI":"10.3389\/fnins.2014.00376","article-title":"Sitting and standing intention can be decoded from scalp EEG recorded prior to movement execution","volume":"8","author":"Bulea","year":"2014","journal-title":"Front. Neurosci."},{"key":"ref_30","unstructured":"Zhang, D., Yao, L., Zhang, X., Wang, S., Chen, W., and Boots, R. (2017). EEG-based intention recognition from spatio-temporal representations via cascade and parallel convolutional recurrent neural networks. ArXiv."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"63","DOI":"10.3389\/fnhum.2019.00063","article-title":"Classification of movement intention using independent components of premovement EEG","volume":"13","author":"Kim","year":"2019","journal-title":"Front. Hum. Neurosci."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"184","DOI":"10.3389\/fnagi.2018.00184","article-title":"Predicting age from brain EEG signals\u2014A machine learning approach","volume":"10","author":"Zoubi","year":"2018","journal-title":"Front. Aging Neurosci."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1481","DOI":"10.1109\/TNSRE.2018.2850308","article-title":"Transductive joint-knowledge-transfer TSK FS for recognition of epileptic EEG signals","volume":"26","author":"Deng","year":"2018","journal-title":"IEEE Trans. Neural Syst. Rehabil. Eng."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.neunet.2020.06.018","article-title":"Dynamical system based compact deep hybrid network for classification of Parkinson disease related EEG signals","volume":"130","author":"Shah","year":"2020","journal-title":"Neural Netw."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Acharya, D., Goel, S., Bhardwaj, H., Sakalle, A., and Bhardwaj, A. (2020, January 19\u201324). A long short term memory deep learning network for the classification of negative emotions using EEG signals. Proceedings of the 2020 IEEE International Joint Conference on Neural Networks (IJCNN), Glasgow, UK.","DOI":"10.1109\/IJCNN48605.2020.9207280"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. Action Control, Springer.","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1086\/209170","article-title":"The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research","volume":"15","author":"Sheppard","year":"1988","journal-title":"J. Consum. Res."},{"key":"ref_38","first-page":"72","article-title":"Standardization of Korean version of daily stress inventory (K-DSI)","volume":"8","author":"Joe","year":"2000","journal-title":"Korean J. Psychosom. Med."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.jneumeth.2003.10.009","article-title":"EEGLAB: An open source toolbox for analysis of single-trial EEG dynamics including independent component analysis","volume":"134","author":"Delorme","year":"2004","journal-title":"J. Neurosci. Methods"},{"key":"ref_40","unstructured":"Mullen, T. (2012). CleanLine EEGLAB Plugin, Neuroimaging Informatics Toolsand Resources Clearinghouse (NITRC)."},{"key":"ref_41","unstructured":"Palmer, J.A., Kreutz-Delgado, K., and Makeig, S. (2012). AMICA: An Adaptive Mixture of Independent Component Analyzers with Shared Components, Swartz Center for Computational Neuroscience, University of California San Diego. Tech. Rep."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/s10916-008-9231-z","article-title":"EEG signal analysis: A survey","volume":"34","author":"Subha","year":"2010","journal-title":"J. Med. Syst."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1016\/0013-4694(70)90143-4","article-title":"EEG analysis based on time domain properties","volume":"29","author":"Hjorth","year":"1970","journal-title":"Electroencephalogr. Clin. Neurophysiol."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Li, P., Meziane, R., Otis, M.J.-D., Ezzaidi, H., and Cardou, P. (2014, January 16\u201318). A smart safety helmet using IMU and EEG sensors for worker fatigue detection. Proceedings of the 2014 IEEE International Symposium on Robotic and Sensors Environments (ROSE), Timisoara, Romania.","DOI":"10.1109\/ROSE.2014.6952983"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Hamad, A., Houssein, E.H., Hassanien, A.E., and Fahmy, A.A. (2016, January 28\u201329). Feature extraction of epilepsy EEG using discrete wavelet transform. Proceedings of the 12th International Computer Engineering Conference (ICENCO), Cairo, Egypt.","DOI":"10.1109\/ICENCO.2016.7856467"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.seizure.2015.01.012","article-title":"Wavelet-based EEG processing for computer-aided seizure detection and epilepsy diagnosis","volume":"26","author":"Faust","year":"2015","journal-title":"Seizure"},{"key":"ref_47","first-page":"2309","article-title":"Analysis of EEG signals using nonlinear dynamics and chaos: A review","volume":"9","year":"2015","journal-title":"Appl. Math. Inf. Sci."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Diaz-Uriarte, R. (2007). GeneSrF and varSelRF: A web-based tool and R package for gene selection and classification using random forest. BMC Bioinform., 8.","DOI":"10.1186\/1471-2105-8-328"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Damiani, E., and Jeong, J. (2009). New Directions in Intelligent Interactive Multimedia Systems and Services-2, Springer Science & Business Media.","DOI":"10.1007\/978-3-642-02937-0"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1080\/17470919.2015.1059362","article-title":"Implicit agreeing\/disagreeing intention while reading self-relevant sentences: A human fMRI study","volume":"11","author":"Dong","year":"2016","journal-title":"Soc. Neurosci."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Hashem, Y., Takabi, H., Dantu, R., and Nielsen, R. (November, January 30). A multi-modal neuro physiological study of malicious insider threats. Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA.","DOI":"10.1145\/3139923.3139930"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.neuron.2006.03.015","article-title":"When the brain loses its self: Prefrontal inactivation during sensorimotor processing","volume":"50","author":"Goldberg","year":"2006","journal-title":"Neuron"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.neuroimage.2009.02.006","article-title":"Automated cortical projection of EEG sensors: Anatomical correlation via the international 10\u201310 system","volume":"46","author":"Koessler","year":"2009","journal-title":"NeuroImage"},{"key":"ref_54","unstructured":"Dong, S.-Y., and Lee, S.-Y. (2012, January 10\u201315). Understanding human implicit intention based on frontal electroencephalography (EEG). Proceedings of the 2012 IEEE International Joint Conference on Neural Networks (IJCNN), Brisbane, Australia."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Von Rosenberg, W., Chanwimalueang, T., Goverdovsky, V., Looney, D., Sharp, D., and Mandic, D.P. (2016). Smart helmet: Wearable multichannel ECG and EEG. IEEE J. Transl. Eng. Health Med., 4.","DOI":"10.1109\/JTEHM.2016.2609927"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Tapadar, S., Ray, S., Saha, H.N., Saha, A.K., and Karlose, R. (2018, January 8\u201310). Accident and alcohol detection in Bluetooth enabled smart helmets for motorbikes. Proceedings of the 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC.2018.8301639"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Schnell, T., Melzer, J.E., and Robbins, S.J. (2009, January 1\u20137). The cognitive pilot helmet: Enabling pilot-aware smart avionics. Proceedings of the 2009 Head-and Helmet-Mounted Displays XIV: Design and Applications, Orlando, FL, USA.","DOI":"10.1117\/12.820300"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Kim, J.H., Kim, C.M., Lee, Y.H., and Yim, M.-S. (2020). Electroencephalography-based intention monitoring to support nuclear operators\u2019 communications for safety-relevant tasks. Nuclear Technol., Article in Press.","DOI":"10.1080\/00295450.2020.1837583"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/21\/6365\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:30:43Z","timestamp":1760178643000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/21\/6365"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":58,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2020,11]]}},"alternative-id":["s20216365"],"URL":"https:\/\/doi.org\/10.3390\/s20216365","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,11,8]]}}}