Temporal feature aggregation with attention for insider threat detection from activity logs

P Pal, P Chattopadhyay, M Swarnkar - Expert Systems with Applications, 2023 - Elsevier
Nowadays, insider attacks are emerging as one of the top cybersecurity threats. However,
the detection of insider threats is a more arduous task for many reasons. A significant cause …

A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods

FR Alzaabi, A Mehmood - IEEE Access, 2024 - ieeexplore.ieee.org
Insider threat detection has become a paramount concern in modern times where
organizations strive to safeguard their sensitive information and critical assets from …

Insider Threat Detection: Using Classification Models

TK Rao, N Darapaneni, AR Paduri, A Kumar… - Proceedings of the 2023 …, 2023 - dl.acm.org
Insider threats refer to cyber-attacks originating from within an organization that can cause
significant damage, such as intellectual property theft, sabotage, and sensitive data …