A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …
cybersecurity. This phenomenon indicates that threats require special detection systems …
An insider data leakage detection using one-hot encoding, synthetic minority oversampling and machine learning techniques
T Al-Shehari, RA Alsowail - Entropy, 2021 - mdpi.com
Insider threats are malicious acts that can be carried out by an authorized employee within
an organization. Insider threats represent a major cybersecurity challenge for private and …
an organization. Insider threats represent a major cybersecurity challenge for private and …
Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits
K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …
changing battlefield over who can innovate over the other. While security analysts are …
A new intelligent multilayer framework for insider threat detection
In several earlier studies, machine learning (ML) has been widely used for building insider
threat detection systems. However, the selection of the most appropriate ML classification …
threat detection systems. However, the selection of the most appropriate ML classification …
Malicious insider attack detection in IoTs using data analytics
Internet of Things (IoTs) are set to revolutionize our lives and are widely being adopted
nowadays. The IoT devices have a range of applications including smart homes, smart …
nowadays. The IoT devices have a range of applications including smart homes, smart …
A comparative analysis of honeypots on different cloud platforms
In 2019, the majority of companies used at least one cloud computing service and it is
expected that by the end of 2021, cloud data centres will process 94% of workloads. The …
expected that by the end of 2021, cloud data centres will process 94% of workloads. The …
Applying one-class algorithms for data stream-based insider threat detection
RB Peccatiello, JJC Gondim, LPF Garcia - IEEE Access, 2023 - ieeexplore.ieee.org
An insider threat is anyone who has legitimate access to a particular organization's network
and uses that access to harm that organization. Insider threats may act with or without intent …
and uses that access to harm that organization. Insider threats may act with or without intent …
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection
T Al-Shehari, RA Alsowail - International Journal of Information Security, 2023 - Springer
Cybersecurity threats can be perpetrated by insiders or outsiders. The threats that could be
carried out by insiders are far more serious due to their privileged access, which they may …
carried out by insiders are far more serious due to their privileged access, which they may …
[HTML][HTML] Теоретические и практические аспекты формирования финансового маркетплейса в Российской Федерации
АЛ Белоусов - Russian Journal of Economics and Law, 2021 - cyberleninka.ru
Цель: исследование процессов формирования и реализации на практике финансового
маркетплейса в РоссийскойФедерации и оценка его влияния на перспективы развития …
маркетплейса в РоссийскойФедерации и оценка его влияния на перспективы развития …
Contextual feature representation for image-based insider threat classification
SM Duan, JT Yuan, B Wang - Computers & Security, 2024 - Elsevier
With the rapid development of technology, insider threat incidents frequently occur in
organizations. Detecting insider threats is an essential task in network infrastructure security …
organizations. Detecting insider threats is an essential task in network infrastructure security …