[HTML][HTML] A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks
Faced with the rapid increase in smart Internet-of-Things (IoT) devices and the high demand
for new business-oriented services in the fifth-generation (5G) and beyond network, the …
for new business-oriented services in the fifth-generation (5G) and beyond network, the …
Securing tomorrow: a comprehensive survey on the synergy of Artificial Intelligence and information security
This survey paper explores the transformative role of Artificial Intelligence (AI) in information
security. Traditional methods, especially rule-based approaches, faced significant …
security. Traditional methods, especially rule-based approaches, faced significant …
An insider data leakage detection using one-hot encoding, synthetic minority oversampling and machine learning techniques
T Al-Shehari, RA Alsowail - Entropy, 2021 - mdpi.com
Insider threats are malicious acts that can be carried out by an authorized employee within
an organization. Insider threats represent a major cybersecurity challenge for private and …
an organization. Insider threats represent a major cybersecurity challenge for private and …
Anomaly detection for insider threats using unsupervised ensembles
Insider threat represents a major cybersecurity challenge to companies, organizations, and
government agencies. Insider threat detection involves many challenges, including …
government agencies. Insider threat detection involves many challenges, including …
[HTML][HTML] Adversarial machine learning in IoT from an insider point of view
With the rapid progress and significant successes in various applications, machine learning
has been considered a crucial component in the Internet of Things ecosystem. However …
has been considered a crucial component in the Internet of Things ecosystem. However …
Temporal feature aggregation with attention for insider threat detection from activity logs
Nowadays, insider attacks are emerging as one of the top cybersecurity threats. However,
the detection of insider threats is a more arduous task for many reasons. A significant cause …
the detection of insider threats is a more arduous task for many reasons. A significant cause …
Deep Learning Enabled Early Predicting Cardiovascular Status Using Highly Sensitive Piezoelectric Sensor of Solution‐Processable Nylon‐11
Cardiovascular diseases are found as one of the major cause of deaths globally, these can
be reduced substantially if early‐stage detection and intervention is possible. Regular …
be reduced substantially if early‐stage detection and intervention is possible. Regular …
Implementing data exfiltration defense in situ: a survey of countermeasures and human involvement
MH Chung, Y Yang, L Wang, G Cento, K Jerath… - ACM Computing …, 2023 - dl.acm.org
In this article we consider the problem of defending against increasing data exfiltration
threats in the domain of cybersecurity. We review existing work on exfiltration threats and …
threats in the domain of cybersecurity. We review existing work on exfiltration threats and …
Comparative Data Resample to Predict Subscription Services Attrition Using Tree-based Ensembles
The digital market today, is rippled with a variety of goods/services that promote
monetization and asset exchange with clients constantly seeking improved alternatives at …
monetization and asset exchange with clients constantly seeking improved alternatives at …
Lan: learning adaptive neighbors for real-time insider threat detection
Enterprises and organizations are faced with potential threats from insider employees that
may lead to serious consequences. Previous studies on insider threat detection (ITD) mainly …
may lead to serious consequences. Previous studies on insider threat detection (ITD) mainly …