Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis

IA Gheyas, AE Abdallah - Big data analytics, 2016 - Springer
Cyber security is vital to the success of today's digital economy. The major security threats
are coming from within, as opposed to outside forces. Insider threat detection and prediction …

[HTML][HTML] An intelligent system to detect advanced persistent threats in industrial internet of things (I-IoT)

SH Javed, MB Ahmad, M Asif, SH Almotiri, K Masood… - Electronics, 2022 - mdpi.com
The Industrial Internet of Things (I-IoT) is a manifestation of an extensive industrial network
that interconnects various sensors and wireless devices to integrate cyber and physical …

Augmented whale feature selection for IoT attacks: Structure, analysis and applications

M Mafarja, AA Heidari, M Habib, H Faris… - Future Generation …, 2020 - Elsevier
Smart connected appliances expand the boundaries of the conventional Internet into the
new Internet of Things (IoT). IoT started to hold a significant role in our life, and in several …

An insider threat detection approach based on mouse dynamics and deep learning

T Hu, W Niu, X Zhang, X Liu, J Lu… - Security and …, 2019 - Wiley Online Library
In the current intranet environment, information is becoming more readily accessed and
replicated across a wide range of interconnected systems. Anyone using the intranet …

IoT botnet detection using salp swarm and ant lion hybrid optimization model

R Abu Khurma, I Almomani, I Aljarah - Symmetry, 2021 - mdpi.com
In the last decade, the devices and appliances utilizing the Internet of Things (IoT) have
expanded tremendously, which has led to revolutionary developments in the network …

APT adversarial defence mechanism for industrial IoT enabled cyber-physical system

SH Javed, MB Ahmad, M Asif, W Akram… - IEEE …, 2023 - ieeexplore.ieee.org
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical
Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast …

Malware detection using machine learning algorithms for windows platform

A Hussain, M Asif, MB Ahmad, T Mahmood… - … and Applications: ICITA …, 2022 - Springer
Windows is a popular Graphical User Interface-based Operating System that provides
services like storage, run third-party software, play videos, network connection, etc. The …

User behavior based insider threat detection using a multi fuzzy classifier

M Singh, BM Mehtre, S Sangeetha - Multimedia Tools and Applications, 2022 - Springer
Insider threats are a significant source of security breaches in organizations. They are often
identified using machine and deep learning methods. These methods rely on predefined …

Tracking the insider attacker: A blockchain traceability system for insider threats

T Hu, B Xin, X Liu, T Chen, K Ding, X Zhang - Sensors, 2020 - mdpi.com
The insider threats have always been one of the most severe challenges to cybersecurity. It
can lead to the destruction of the organisation's internal network system and information …

Implementation of insider threat detection system using honeypot based sensors and threat analytics

MM Yamin, B Katt, K Sattar, MB Ahmad - … Proceedings of the 2019 Future of …, 2020 - Springer
An organization is a combination of vision, technology and employees. The wellbeing of
organization is directly associated with the honesty of its workers. However, an organization …