Insider Threat Detection: A Review
In the cyber world, insider threats significantly challenge organizational security. These
threats originate from malicious or negligent employees with authorized access, making …
threats originate from malicious or negligent employees with authorized access, making …
A novel deep synthesis-based insider intrusion detection (DS-IID) model for malicious insiders and AI-generated threats
Insider threats pose a significant challenge to IT security, particularly with the rise of
generative AI technologies, which can create convincing fake user profiles and mimic …
generative AI technologies, which can create convincing fake user profiles and mimic …
Predictive modeling and anomaly detection in large-scale web portals through the CAWAL framework
This study presents an approach that uses session and page view data collected through
the CAWAL framework, enriched through specialized processes, for advanced predictive …
the CAWAL framework, enriched through specialized processes, for advanced predictive …
Supervised Learning for Insider Threat Detection
P Manoharan - 2024 - vuir.vu.edu.au
Cyberattacks cause havoc in the digital world, but the most significant threat might be from
those who appear to be trustworthy: insiders. Insider threats pose a significant and evolving …
those who appear to be trustworthy: insiders. Insider threats pose a significant and evolving …
Severity-Oriented Multiclass Drone Flight Logs Anomaly Detection
The availability of log data recorded by computer-based systems such as operating system
and network logs, makes it possible for the stakeholder to look after the system for …
and network logs, makes it possible for the stakeholder to look after the system for …
[HTML][HTML] Web Traffic Anomaly Detection Using Isolation Forest
W Chua, ALD Pajas, CS Castro, SP Panganiban… - Informatics, 2024 - mdpi.com
As companies increasingly undergo digital transformation, the value of their data assets also
rises, making them even more attractive targets for hackers. The large volume of weblogs …
rises, making them even more attractive targets for hackers. The large volume of weblogs …
Severity-oriented multiclass drone flight logs anomaly detection
The availability of log data recorded by computer-based systems such as operating system
and network logs, makes it possible for the stakeholder to look after the system for …
and network logs, makes it possible for the stakeholder to look after the system for …
Insider Threat Defense Strategies: Survey and Knowledge Integration
C Song, J Zhang, L Ma, X Hu, J Zheng… - … Conference on Knowledge …, 2024 - Springer
Insider threats are one of the most challenging cybersecurity issues today, and are receiving
increasing attention both in the computer science community and in the government and …
increasing attention both in the computer science community and in the government and …
Assessing Current Scenario of Insider Threat in the Perspective of Recent Pandemic
Insider threat is the cybersecurity risk originating within the enterprises. It is found that a few
insiders are insidious and misuse their privileged access for malicious activities. Research …
insiders are insidious and misuse their privileged access for malicious activities. Research …
Advanced Privacy-Preserving Decentralized Federated Learning for Insider Threat Detection in Collaborative Healthcare Institutions
KDD Newman - 2025 - search.proquest.com
The healthcare sector is embracing a digital transformation driven by technological
advancements and the quest for more effective healthcare delivery. This transformation has …
advancements and the quest for more effective healthcare delivery. This transformation has …