Technical privacy metrics: a systematic survey
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …
Deep learning for insider threat detection: Review, challenges and opportunities
Insider threats, as one type of the most challenging threats in cyberspace, usually cause
significant loss to organizations. While the problem of insider threat detection has been …
significant loss to organizations. While the problem of insider threat detection has been …
Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset
SM Kasongo, Y Sun - Journal of Big Data, 2020 - Springer
Computer networks intrusion detection systems (IDSs) and intrusion prevention systems
(IPSs) are critical aspects that contribute to the success of an organization. Over the past …
(IPSs) are critical aspects that contribute to the success of an organization. Over the past …
An extensive study on pre-trained models for program understanding and generation
Automatic program understanding and generation techniques could significantly advance
the productivity of programmers and have been widely studied by academia and industry …
the productivity of programmers and have been widely studied by academia and industry …
Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures
Insider threats are one of today's most challenging cybersecurity issues that are not well
addressed by commonly employed security solutions. In this work, we propose structural …
addressed by commonly employed security solutions. In this work, we propose structural …
Enterprise data breach: causes, challenges, prevention, and future directions
A data breach is the intentional or inadvertent exposure of confidential information to
unauthorized parties. In the digital era, data has become one of the most critical components …
unauthorized parties. In the digital era, data has become one of the most critical components …
Deep just-in-time defect prediction: how far are we?
Defect prediction aims to automatically identify potential defective code with minimal human
intervention and has been widely studied in the literature. Just-in-Time (JIT) defect prediction …
intervention and has been widely studied in the literature. Just-in-Time (JIT) defect prediction …
Automatic precursor recognition and real-time forecasting of sudden explosive volcanic eruptions at Whakaari, New Zealand
DE Dempsey, SJ Cronin, S Mei… - Nature …, 2020 - nature.com
Sudden steam-driven eruptions strike without warning and are a leading cause of fatalities
at touristic volcanoes. Recent deaths following the 2019 Whakaari eruption in New Zealand …
at touristic volcanoes. Recent deaths following the 2019 Whakaari eruption in New Zealand …
Data exfiltration: A review of external attack vectors and countermeasures
Context One of the main targets of cyber-attacks is data exfiltration, which is the leakage of
sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …
sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …
An OWASP top ten driven survey on web application protection methods
OB Fredj, O Cheikhrouhou, M Krichen… - Risks and Security of …, 2021 - Springer
Web applications (WAs) are constantly evolving and deployed at broad scale. However, they
are exposed to a variety of attacks. The biggest challenge facing organizations is how to …
are exposed to a variety of attacks. The biggest challenge facing organizations is how to …