会议名称: 2024 International Conference on Circuit, Systems and Communication (ICCSC) 主办单位: IEEE 收藏 引用 批量引用 报错 分享 全部来源 免费下载 求助全文 IEEEXplore IEEEXplore (全网免费下载) 相似文献Sentiment classification for insider threat identification using metaheuristic optimized machine ...
Sharma B, Pokharel P, Joshi B (2020) User behavior analytics for anomaly detection using LSTM autoencoder-insider threat detection. In: Proceedings of the 11th international conference on advances in information technology Yuan F, Shang Y, Liu Y, Cao Y, Tan J (2019) Attention-based LSTM for...
Insider Threat is well known as the ultimate risk for operating nuclear facilities due to the insiders ability to bypass multiple elements of a security system with their inherent access rights and facility knowledge. However, it is arguable as to whether enough is being done to mitigate this ...
展开 关键词: Deep learning Computers Performance evaluation Costs Phishing Intrusion detection Sea measurements Threat assessment Loss measurement Research and development 会议名称: 2024 International Conference on Electrical, Computer and Energy Technologies (ICECET 主办...
This work is an exposition of the internal personnel threat to information security. It provides a brief overview of and how to manage the insider threat from an undergraduate perspective. This document explains the threat of the members of an organization to that organization itself, critiques rece...
Researchers usually detect insider threats by analyzing user behavior. The time information of user behavior is an important concern in internal threat detection. Existing works on insider threat detection fail to make full use of the time information, w
In this paper, we propose a game theory framework to solve advanced persistent threat problems, especially considering two types of insider threats: malici... Z Chen,G Chen,Y Hong - 《Unmanned Systems》 被引量: 0发表: 2024年 Defense for Advanced Persistent Threat with Inadvertent or Malicious...
More coverage from this week's Surface Navy Association conference: Progress in readiness, unmanned technology necessary to meet existential threat of Russia and China, Fleet Forces commander says As China and Russia strengthen their naval relationship and increase joint patrols, training and port visits...
Insider threats pose a significant challenge in cybersecurity, demanding advanced detection methods for effective risk mitigation. This paper presents a comparative evaluation of data imbalance addressing techniques for CNN-based insider threat detection
Results also showed that organizations themselves can be a contributing factor to insider threat activity where relaxed security standards are evident. Despite the advantage insider threats have, organizations can implement a security-minded culture of awareness and reporting that will help deter or at ...