Insider Threat Detection: A Review

P Manoharan, J Yin, H Wang… - … on Networking and …, 2024 - ieeexplore.ieee.org
In the cyber world, insider threats significantly challenge organizational security. These
threats originate from malicious or negligent employees with authorized access, making …

A novel deep synthesis-based insider intrusion detection (DS-IID) model for malicious insiders and AI-generated threats

HM Kotb, T Gaber, S AlJanah, HM Zawbaa… - Scientific Reports, 2025 - nature.com
Insider threats pose a significant challenge to IT security, particularly with the rise of
generative AI technologies, which can create convincing fake user profiles and mimic …

Predictive modeling and anomaly detection in large-scale web portals through the CAWAL framework

Ö Canay, Ü Kocabıçak - Knowledge-Based Systems, 2024 - Elsevier
This study presents an approach that uses session and page view data collected through
the CAWAL framework, enriched through specialized processes, for advanced predictive …

Supervised Learning for Insider Threat Detection

P Manoharan - 2024 - vuir.vu.edu.au
Cyberattacks cause havoc in the digital world, but the most significant threat might be from
those who appear to be trustworthy: insiders. Insider threats pose a significant and evolving …

Severity-Oriented Multiclass Drone Flight Logs Anomaly Detection

S Silalahi, T Ahmad, H Studiawan, E Anthi… - IEEE …, 2024 - ieeexplore.ieee.org
The availability of log data recorded by computer-based systems such as operating system
and network logs, makes it possible for the stakeholder to look after the system for …

[HTML][HTML] Web Traffic Anomaly Detection Using Isolation Forest

W Chua, ALD Pajas, CS Castro, SP Panganiban… - Informatics, 2024 - mdpi.com
As companies increasingly undergo digital transformation, the value of their data assets also
rises, making them even more attractive targets for hackers. The large volume of weblogs …

Severity-oriented multiclass drone flight logs anomaly detection

S Silalahi, T Ahmad, H Studiawan, E Anthi… - IEEE Access, 2024 - orca.cardiff.ac.uk
The availability of log data recorded by computer-based systems such as operating system
and network logs, makes it possible for the stakeholder to look after the system for …

Insider Threat Defense Strategies: Survey and Knowledge Integration

C Song, J Zhang, L Ma, X Hu, J Zheng… - … Conference on Knowledge …, 2024 - Springer
Insider threats are one of the most challenging cybersecurity issues today, and are receiving
increasing attention both in the computer science community and in the government and …

Assessing Current Scenario of Insider Threat in the Perspective of Recent Pandemic

G Sandra, S Silas, EB Rajsingh - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Insider threat is the cybersecurity risk originating within the enterprises. It is found that a few
insiders are insidious and misuse their privileged access for malicious activities. Research …

Advanced Privacy-Preserving Decentralized Federated Learning for Insider Threat Detection in Collaborative Healthcare Institutions

KDD Newman - 2025 - search.proquest.com
The healthcare sector is embracing a digital transformation driven by technological
advancements and the quest for more effective healthcare delivery. This transformation has …