Technical privacy metrics: a systematic survey

I Wagner, D Eckhoff - ACM Computing Surveys (Csur), 2018 - dl.acm.org
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …

Deep learning for insider threat detection: Review, challenges and opportunities

S Yuan, X Wu - Computers & Security, 2021 - Elsevier
Insider threats, as one type of the most challenging threats in cyberspace, usually cause
significant loss to organizations. While the problem of insider threat detection has been …

Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset

SM Kasongo, Y Sun - Journal of Big Data, 2020 - Springer
Computer networks intrusion detection systems (IDSs) and intrusion prevention systems
(IPSs) are critical aspects that contribute to the success of an organization. Over the past …

An extensive study on pre-trained models for program understanding and generation

Z Zeng, H Tan, H Zhang, J Li, Y Zhang… - Proceedings of the 31st …, 2022 - dl.acm.org
Automatic program understanding and generation techniques could significantly advance
the productivity of programmers and have been widely studied by academia and industry …

Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures

I Homoliak, F Toffalini, J Guarnizo, Y Elovici… - ACM Computing …, 2019 - dl.acm.org
Insider threats are one of today's most challenging cybersecurity issues that are not well
addressed by commonly employed security solutions. In this work, we propose structural …

Enterprise data breach: causes, challenges, prevention, and future directions

L Cheng, F Liu, D Yao - Wiley Interdisciplinary Reviews: Data …, 2017 - Wiley Online Library
A data breach is the intentional or inadvertent exposure of confidential information to
unauthorized parties. In the digital era, data has become one of the most critical components …

Deep just-in-time defect prediction: how far are we?

Z Zeng, Y Zhang, H Zhang, L Zhang - Proceedings of the 30th ACM …, 2021 - dl.acm.org
Defect prediction aims to automatically identify potential defective code with minimal human
intervention and has been widely studied in the literature. Just-in-Time (JIT) defect prediction …

Automatic precursor recognition and real-time forecasting of sudden explosive volcanic eruptions at Whakaari, New Zealand

DE Dempsey, SJ Cronin, S Mei… - Nature …, 2020 - nature.com
Sudden steam-driven eruptions strike without warning and are a leading cause of fatalities
at touristic volcanoes. Recent deaths following the 2019 Whakaari eruption in New Zealand …

Data exfiltration: A review of external attack vectors and countermeasures

F Ullah, M Edwards, R Ramdhany, R Chitchyan… - Journal of Network and …, 2018 - Elsevier
Context One of the main targets of cyber-attacks is data exfiltration, which is the leakage of
sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …

An OWASP top ten driven survey on web application protection methods

OB Fredj, O Cheikhrouhou, M Krichen… - Risks and Security of …, 2021 - Springer
Web applications (WAs) are constantly evolving and deployed at broad scale. However, they
are exposed to a variety of attacks. The biggest challenge facing organizations is how to …