A survey on machine learning against hardware trojan attacks: Recent advances and challenges

Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …

[HTML][HTML] An insider data leakage detection using one-hot encoding, synthetic minority oversampling and machine learning techniques

T Al-Shehari, RA Alsowail - Entropy, 2021 - mdpi.com
Insider threats are malicious acts that can be carried out by an authorized employee within
an organization. Insider threats represent a major cybersecurity challenge for private and …

[HTML][HTML] Techniques and countermeasures for preventing insider threats

RA Alsowail, T Al-Shehari - PeerJ Computer Science, 2022 - peerj.com
With the wide use of technologies nowadays, various security issues have emerged. Public
and private sectors are both spending a large portion of their budget to protect the …

[HTML][HTML] A multi-tiered framework for insider threat prevention

RA Alsowail, T Al-Shehari - Electronics, 2021 - mdpi.com
As technologies are rapidly evolving and becoming a crucial part of our lives, security and
privacy issues have been increasing significantly. Public and private organizations have …

Llm for soc security: A paradigm shift

D Saha, S Tarek, K Yahyaei, SK Saha, J Zhou… - arXiv preprint arXiv …, 2023 - arxiv.org
As the ubiquity and complexity of system-on-chip (SoC) designs increase across electronic
devices, the task of incorporating security into an SoC design flow poses significant …

Understanding insiders in cloud adopted organizations: A survey on taxonomies, incident analysis, defensive solutions, challenges

S Asha, D Shanmugapriya - Future Generation Computer Systems, 2024 - Elsevier
In cybersecurity, one of the most significant challenges is an insider threat, in which existing
researchers must provide an extensive solution aiming at an enhanced security network …

Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards

AK Chillara, P Saxena, RR Maiti, M Gupta… - International Journal of …, 2024 - Springer
Due to its plug-and-play functionality and wide device support, the universal serial bus
(USB) protocol has become one of the most widely used protocols. However, this …

An insider threat detection model using one-hot encoding and near-miss under-sampling techniques

RA Alsowail - Proceedings of International Joint Conference on …, 2022 - Springer
Insider threats are malicious acts (eg, data theft, fraud, and sabotage) which are very difficult
to detect as they are conducted by an authorized user. The existing research in the topic of …

USB rubber ducky detection by using heuristic rules

L Arora, N Thakur, SK Yadav - 2021 International Conference …, 2021 - ieeexplore.ieee.org
With the rise in tightening of the Cybersecurity rules and policies implemented by the
corporate houses, the work that malicious hackers need to do to compromise a system has …

A Machine Learning Framework for Host Based Intrusion Detection using System Call Abstraction

R Taj - 2020 - dalspace.library.dal.ca
The number of cyber threats is increasing faster than the number of defensive strategies
deployed to tackle those threats. An automated Intrusion Detection System (IDS) has the …