[HTML][HTML] A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks

M Liyanage, QV Pham, K Dev, S Bhattacharya… - Journal of Network and …, 2022 - Elsevier
Faced with the rapid increase in smart Internet-of-Things (IoT) devices and the high demand
for new business-oriented services in the fifth-generation (5G) and beyond network, the …

Securing tomorrow: a comprehensive survey on the synergy of Artificial Intelligence and information security

E Hashmi, MM Yamin, SY Yayilgan - AI and Ethics, 2024 - Springer
This survey paper explores the transformative role of Artificial Intelligence (AI) in information
security. Traditional methods, especially rule-based approaches, faced significant …

An insider data leakage detection using one-hot encoding, synthetic minority oversampling and machine learning techniques

T Al-Shehari, RA Alsowail - Entropy, 2021 - mdpi.com
Insider threats are malicious acts that can be carried out by an authorized employee within
an organization. Insider threats represent a major cybersecurity challenge for private and …

Anomaly detection for insider threats using unsupervised ensembles

DC Le, N Zincir-Heywood - IEEE Transactions on Network and …, 2021 - ieeexplore.ieee.org
Insider threat represents a major cybersecurity challenge to companies, organizations, and
government agencies. Insider threat detection involves many challenges, including …

[HTML][HTML] Adversarial machine learning in IoT from an insider point of view

F Aloraini, A Javed, O Rana, P Burnap - Journal of Information Security and …, 2022 - Elsevier
With the rapid progress and significant successes in various applications, machine learning
has been considered a crucial component in the Internet of Things ecosystem. However …

Temporal feature aggregation with attention for insider threat detection from activity logs

P Pal, P Chattopadhyay, M Swarnkar - Expert Systems with Applications, 2023 - Elsevier
Nowadays, insider attacks are emerging as one of the top cybersecurity threats. However,
the detection of insider threats is a more arduous task for many reasons. A significant cause …

Deep Learning Enabled Early Predicting Cardiovascular Status Using Highly Sensitive Piezoelectric Sensor of Solution‐Processable Nylon‐11

A Babu, S Ranpariya, DK Sinha… - Advanced Materials …, 2023 - Wiley Online Library
Cardiovascular diseases are found as one of the major cause of deaths globally, these can
be reduced substantially if early‐stage detection and intervention is possible. Regular …

Implementing data exfiltration defense in situ: a survey of countermeasures and human involvement

MH Chung, Y Yang, L Wang, G Cento, K Jerath… - ACM Computing …, 2023 - dl.acm.org
In this article we consider the problem of defending against increasing data exfiltration
threats in the domain of cybersecurity. We review existing work on exfiltration threats and …

Comparative Data Resample to Predict Subscription Services Attrition Using Tree-based Ensembles

MD Okpor, FO Aghware, MI Akazue… - Journal of Fuzzy …, 2024 - ejournal.ptti.web.id
The digital market today, is rippled with a variety of goods/services that promote
monetization and asset exchange with clients constantly seeking improved alternatives at …

Lan: learning adaptive neighbors for real-time insider threat detection

X Cai, Y Wang, S Xu, H Li, Y Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Enterprises and organizations are faced with potential threats from insider employees that
may lead to serious consequences. Previous studies on insider threat detection (ITD) mainly …