Bilateral insider threat detection: Harnessing standalone and sequential activities with recurrent neural networks

P Manoharan, W Hong, J Yin, Y Zhang, W Ye… - … Conference on Web …, 2023 - Springer
Insider threats involving authorised individuals exploiting their access privileges within an
organisation can yield substantial damage compared to external threats. Conventional …

[PDF][PDF] A Machine Learning Approach to Identify Phishing Websites: A Comparative Study of Classification Models and Ensemble Learning Techniques.

BK Gontla, P Gundu, PJ Uppalapati… - EAI Endorsed …, 2023 - academia.edu
Phishing assaults are one of the more prevalent types of cybercrime in the world today. To
steal information, users are sent emails and messages. Moreover, websites are used for it …

Study on Credit Risk Control by Variational Inference

K Wang, A Li, X Wang, L Sun - International Conference on Web …, 2023 - Springer
This paper presents the development of an intelligent, machine learning-based Markov
chain model to investigate loan risk and strategies for controlling credit risk. The model …

Lightweight Cryptographic Simulation of Power IoT Fused with Bayesian Network Algorithms

X Zhu, C Hu, Y Lu, Z Wang, H Xue - EAI Endorsed Transactions …, 2023 - publications.eai.eu
In the power system, the transmission and processing of information is a very important link,
and the core part of it is electronic data, and the transmission and processing of electronic …

Design of intrusion detection and prevention model using COOT optimization and hybrid LSTM-KNN classifier for MANET

G Madhu - EAI Endorsed Transactions on Scalable Information …, 2022 - eudl.eu
INTRODUCTION: MANET is an emerging technology that has gained traction in a variety of
applications due to its ability to analyze large amounts of data in a short period of time. Thus …

Towards an Effective Attribute-Based Access Control Model for Neo4j

AA Bereksi Reguig, H Mahfoud, A Imine - International Conference on …, 2023 - Springer
The graph data model is increasingly used in practice due to its flexibility in modeling
complex real-life data. However, some security features (eg, access control) are not …

Analysis and Protection of Public Medical Dataset: From Privacy Perspective

S Jahan, YF Ge, E Kabir, H Wang - International Conference on Health …, 2023 - Springer
High-quality medical treatment is unattainable without protecting patients' medical records
and other sensitive information. One of the most critical challenges in the medical industry is …

Unveiling the Pandemic's Impact: A Dataset for Probing COVID-19's Effects on E-Learning Activities and Academic Performance

Y Liu, D Luo, K Wang, J Yin - International Conference on Health …, 2023 - Springer
During the COVID-19 pandemic, educational institutions worldwide were affected and forced
to switch to online education. This paper presents an open-source dataset that examines the …

Knowledge-Related Policy Analysis in an Inference-Enabled Actor Model.

S Riahi, R Khosravi… - Journal of Universal …, 2024 - search.ebscohost.com
People provide their information to distributed systems to receive the desired services. This
information may be disclosed to the agents of the system as part of messages transmitted …

Analyzing the Impact of COVID-19 on Education: A Comparative Study Based on TOEFL Test Results

P Xu, W Hong, J Yin, K Wang, Y Zhang - International Conference on …, 2023 - Springer
The COVID-19 pandemic and subsequent lockdown policies have significantly impacted the
education sector worldwide. However, there has been a lack of analysis regarding the …