[HTML][HTML] A graph empowered insider threat detection framework based on daily activities

W Hong, J Yin, M You, H Wang, J Cao, J Li, M Liu… - ISA transactions, 2023 - Elsevier
While threats from outsiders are easier to alleviate, effective ways seldom exist to handle
threats from insiders. The key to managing insider threats lies in engineering behavioral …

Temporal feature aggregation with attention for insider threat detection from activity logs

P Pal, P Chattopadhyay, M Swarnkar - Expert Systems with Applications, 2023 - Elsevier
Nowadays, insider attacks are emerging as one of the top cybersecurity threats. However,
the detection of insider threats is a more arduous task for many reasons. A significant cause …

Graph intelligence enhanced bi-channel insider threat detection

W Hong, J Yin, M You, H Wang, J Cao, J Li… - … Conference on Network …, 2022 - Springer
For an organization, insider intrusion generally poses far more detrimental threats than
outsider intrusion. Traditionally, insider threat is detected by analyzing logged user …

Insider Threat Detection: A Review

P Manoharan, J Yin, H Wang… - … on Networking and …, 2024 - ieeexplore.ieee.org
In the cyber world, insider threats significantly challenge organizational security. These
threats originate from malicious or negligent employees with authorized access, making …

Insider threat detection using supervised machine learning algorithms

P Manoharan, J Yin, H Wang, Y Zhang… - Telecommunication …, 2023 - Springer
Insider threats refer to abnormal actions taken by individuals with privileged access,
compromising system data's confidentiality, integrity, and availability. They pose significant …

Supervised Learning for Insider Threat Detection

P Manoharan - 2024 - vuir.vu.edu.au
Cyberattacks cause havoc in the digital world, but the most significant threat might be from
those who appear to be trustworthy: insiders. Insider threats pose a significant and evolving …

A proposed approach to analyze insider threat detection using emails

A Mittal, U Garg - 2022 3rd International Conference on …, 2022 - ieeexplore.ieee.org
As we know, now a days everything is more dependent on technology, also all the private
and government organizations are using technology for accomplishing each and every task …

Optimising Insider Threat Prediction: Exploring BiLSTM Networks and Sequential Features

P Manoharan, W Hong, J Yin, H Wang, Y Zhang… - Data Science and …, 2024 - Springer
Insider threats pose a critical risk to organisations, impacting their data, processes,
resources, and overall security. Such significant risks arise from individuals with authorised …

Optimising Insider Threat Prediction: Exploring BiLSTM Networks and Sequential Features: Optimising Insider Threat Prediction...: P. Manoharan et al.

P Manoharan, W Hong, J Yin, H Wang… - Data Science & …, 2024 - search.ebscohost.com
Insider threats pose a critical risk to organisations, impacting their data, processes,
resources, and overall security. Such significant risks arise from individuals with authorised …

[HTML][HTML] Seismic reflection analysis of AETA electromagnetic signals

Z Bao, S Yong, X Wang, C Yang, J Xie, C He - Applied Sciences, 2021 - mdpi.com
Acoustic and electromagnetics to artificial intelligence (AETA) is a system used to predict
seismic events through monitoring of electromagnetic and geoacoustic signals. It is widely …