Understanding insiders in cloud adopted organizations: A survey on taxonomies, incident analysis, defensive solutions, challenges

S Asha, D Shanmugapriya - Future Generation Computer Systems, 2024 - Elsevier
In cybersecurity, one of the most significant challenges is an insider threat, in which existing
researchers must provide an extensive solution aiming at an enhanced security network …

Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards

AK Chillara, P Saxena, RR Maiti, M Gupta… - International Journal of …, 2024 - Springer
Due to its plug-and-play functionality and wide device support, the universal serial bus
(USB) protocol has become one of the most widely used protocols. However, this …

Mitigating Insider Threat's IP Spoofing through Enhanced Dynamic Cluster Algorithm (EDPU Based HCF)

OA Akano, TO Olayinka, OD Adeniji… - Advances in …, 2024 - eprint.subtopublish.com
Insider Threat has always been a major problem to computer security due to unauthorized
system misuse by users in an organization. Understanding the concept and the inherent …