Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis
IA Gheyas, AE Abdallah - Big data analytics, 2016 - Springer
Cyber security is vital to the success of today's digital economy. The major security threats
are coming from within, as opposed to outside forces. Insider threat detection and prediction …
are coming from within, as opposed to outside forces. Insider threat detection and prediction …
[HTML][HTML] An intelligent system to detect advanced persistent threats in industrial internet of things (I-IoT)
The Industrial Internet of Things (I-IoT) is a manifestation of an extensive industrial network
that interconnects various sensors and wireless devices to integrate cyber and physical …
that interconnects various sensors and wireless devices to integrate cyber and physical …
Augmented whale feature selection for IoT attacks: Structure, analysis and applications
Smart connected appliances expand the boundaries of the conventional Internet into the
new Internet of Things (IoT). IoT started to hold a significant role in our life, and in several …
new Internet of Things (IoT). IoT started to hold a significant role in our life, and in several …
An insider threat detection approach based on mouse dynamics and deep learning
In the current intranet environment, information is becoming more readily accessed and
replicated across a wide range of interconnected systems. Anyone using the intranet …
replicated across a wide range of interconnected systems. Anyone using the intranet …
IoT botnet detection using salp swarm and ant lion hybrid optimization model
In the last decade, the devices and appliances utilizing the Internet of Things (IoT) have
expanded tremendously, which has led to revolutionary developments in the network …
expanded tremendously, which has led to revolutionary developments in the network …
APT adversarial defence mechanism for industrial IoT enabled cyber-physical system
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical
Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast …
Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast …
Malware detection using machine learning algorithms for windows platform
Windows is a popular Graphical User Interface-based Operating System that provides
services like storage, run third-party software, play videos, network connection, etc. The …
services like storage, run third-party software, play videos, network connection, etc. The …
User behavior based insider threat detection using a multi fuzzy classifier
M Singh, BM Mehtre, S Sangeetha - Multimedia Tools and Applications, 2022 - Springer
Insider threats are a significant source of security breaches in organizations. They are often
identified using machine and deep learning methods. These methods rely on predefined …
identified using machine and deep learning methods. These methods rely on predefined …
Tracking the insider attacker: A blockchain traceability system for insider threats
The insider threats have always been one of the most severe challenges to cybersecurity. It
can lead to the destruction of the organisation's internal network system and information …
can lead to the destruction of the organisation's internal network system and information …
Implementation of insider threat detection system using honeypot based sensors and threat analytics
An organization is a combination of vision, technology and employees. The wellbeing of
organization is directly associated with the honesty of its workers. However, an organization …
organization is directly associated with the honesty of its workers. However, an organization …