Machine-Learning-Based Scoring System for Antifraud CISIRTs in Banking Environment

M Srokosz, A Bobyk, B Ksiezopolski, M Wydra - Electronics, 2023 - mdpi.com
The number of fraud occurrences in electronic banking is rising each year. Experts in the
field of cybercrime are continuously monitoring and verifying network infrastructure and …

Unveiling Shadows: Harnessing Artificial Intelligence for Insider Threat Detection

E Yilmaz, O Can - Engineering, Technology & Applied Science Research, 2024 - etasr.com
Insider threats pose a significant risk to organizations, necessitating robust detection
mechanisms to safeguard against potential damage. Traditional methods struggle to detect …

User Modeling and User Profiling: A Comprehensive Survey

E Purificato, L Boratto, EW De Luca - arXiv preprint arXiv:2402.09660, 2024 - arxiv.org
The integration of artificial intelligence (AI) into daily life, particularly through information
retrieval and recommender systems, has necessitated advanced user modeling and …

Smart chatbot for user authentication

P Voege, IIM Abu Sulayman, A Ouda - Electronics, 2022 - mdpi.com
Despite being the most widely used authentication mechanism, password-based
authentication is not very secure, being easily guessed or brute-forced. To address this …

An Innovative Multi-Factor Authentication Approach

P Voege, A Ouda - 2022 International Symposium on Networks …, 2022 - ieeexplore.ieee.org
In a modern digital environment, there is a continual need for new and better authentication
methods, particularly in the context of Multi-Factor Authentication systems. A new …

Designing security user profiles via anomaly detection for user authentication

IIMA Sulayman, A Ouda - 2020 International Symposium on …, 2020 - ieeexplore.ieee.org
The ability to detect the anomalous user behavior automatically and create user profiles,
storing fresh and accurate security aspect user information, is important for systems …

Real-Time Data Generation and Anomaly Detection for Security User Profiles

IIMA Sulayman, A Ouda - 2022 International Symposium on …, 2022 - ieeexplore.ieee.org
Mostly, security user profiles are being generated from real-time sources of users' data. User
profiles generation process involves complicated and comprehensive data analysis …

Human trait analysis via machine learning techniques for user authentication

IIMA Sulayman, A Ouda - 2020 International Symposium on …, 2020 - ieeexplore.ieee.org
Machine learning is an extremely important technique that has become heavily used in
different types of applications such as detection systems for fraud, intrusion or fault and …

[PDF][PDF] Adaptive User Profiling with Online Incremental Machine Learning for Security Information and Event Management

DP Sharma, B Kaur, F Shoeleh, M Erfani, DP Le… - researchgate.net
In the past few years, there has been an exponential growth in network and Internet traffic.
This trend will continue to increase due to digitalization and resulting in more …

Design and Implementation of Anomaly Detections for User Authentication Framework

IA Sulayman - 2019 - search.proquest.com
Anomaly detection is quickly becoming a very significant tool for a variety of applications
such as intrusion detection, fraud detection, fault detection, system health monitoring, and …