Zero trust architecture (ZTA) is a paradigm shift in how we protect data, stay connected and access resources. ZTA is non-perimeter-based defence, which has been emerging as a …
M Singh, BM Mehtre, S Sangeetha… - Journal of Ambient …, 2023 - Springer
Insider threats constitute a major cause of security breaches in organizations. They are the employees/users of an organization, causing harm by performing any malicious activity …
Insider attacks may inflict far greater damage to an organization than outsider threats since insiders are authorized users who are acquainted with the business's system, making …
The rise of online transactions has led to a corresponding increase in online criminal activities. Account takeover attacks, in particular, are challenging to detect, and novel …
Insider threats are profoundly damaging and pose serious security challenges. These threats, perpetrated by insiders, may arise from delinquency, retaliation, or motives such as …
Cyber-attacks are becoming increasingly sophisticated and frequent, highlighting the importance of network intrusion detection systems. This paper explores the potential and …
With the recent Covid-19 pandemic, the global work landscape has been altered forever. More than 70% of the employees worked remotely. While this may be good news for …
Y Cao, Y Chen, Y Wang, N Hu, Z Gu, Y Jia - Asia-Pacific Web (APWeb) …, 2024 - Springer
Malicious insider attacks are among the most destructive threats to enterprises. Solving the insider threat problem involves several challenges, including data imbalance and detection …
The escalating concern regarding insider threats has emerged as a significant cybersecurity challenge for various sectors, including organizations, financial institutions, and …