Deep Learning for Analyzing User and Entity Behaviors: Techniques and Applications

RK Mohanty, AP Kumar, R Padmaja… - … Behavior in the Age of …, 2024 - igi-global.com
User and entity behavior analytics (UEBA) is a critical component of modern cybersecurity
strategies aimed at detecting and mitigating security threats within enterprise environments …

A comprehensive investigation of clustering algorithms for User and Entity Behavior Analytics

P Artioli, A Maci, A Magrì - Frontiers in big Data, 2024 - frontiersin.org
Introduction Government agencies are now encouraging industries to enhance their security
systems to detect and respond proactively to cybersecurity incidents. Consequently …

[PDF][PDF] Advanced threat detection in api security: Leveraging machine learning algorithms

P Ranjan, S Dahiya - International Journal of Communication …, 2021 - researchgate.net
The use of APIs in the current software environments has amplified the vulnerability of APIs
in the face of cybsecurity risks. Since APIs are in-between interfaces between the systems, it …

Zero Trust Architecture For Cyber-Physical Power System Security Based on Machine Learning

X Feng, S Hu - AI Embedded Assurance for Cyber Systems, 2023 - Springer
The expanding integration of multiple measuring, monitoring, and communication
infrastructures and the increasing deployment of renewable energy sources and power …

Zero to Trust? Bringing Application-Level Intelligence at Scale to Detection Engineering

F Gey, C Hebert, H Mack - 2024 IEEE International Conference …, 2024 - ieeexplore.ieee.org
The transformation to cyber resilience (CR) is a prioritized goal for most organisations world
wide, as they are facing highly sophisticated adversaries with increasing resources …

Aspects of artificial intelligent applications in cyber security to decrease threats and restrict cyber attacks for smart grids

M Al-Dulaimi, A Al-Dulaimi, O Al-Dulaimi… - AIP Conference …, 2024 - pubs.aip.org
The problem of utilizing machine learning in cyber security is complicated to resolve it. The
explanation for this is not straightforward because developments in the sector have led to …

Analytic-driven decision support in cybersecurity: towards effective IP risk management decision-making process

RS Dolas - 2023 - essay.utwente.nl
With the recent Covid-19 pandemic, the global work landscape has been altered forever.
More than 70% of the employees worked remotely. While this may be good news for …

[PDF][PDF] Обнаружение аномального поведения пользователей и сущностей в контейнерных системах на основе методов машинного обучения

МВ Мельник, ИВ Котенко - Информационная безопасность регионов …, 2023 - spoisu.ru
В настоящее все большую и большую актуальность приобретает задача обнаружения
аномального поведения в контейнерных системах. В работе представлены результаты …

Ueba with log analytics

J Kaur, K Kaur, S Kant, S Das - 2022 3rd International …, 2022 - ieeexplore.ieee.org
Organizations are shifting to the cloud rapidly to enable digital business opportunities. The
cloud's dynamic environment helps them cope with the rapidly changing business …

Detection and Classification of Cybersecurity User/Entity Behaviour Anomalies on Web events

JPS Neves - 2024 - repositorio.ulisboa.pt
For the past decades, companies have been dealing with insider attacks that can cost them
up to millions of dollars each. Finding a way to prevent or quickly detect these attacks has …