A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations

MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin… - Applied Sciences, 2020 - mdpi.com
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …

[HTML][HTML] Insider threat detection in cyber-physical systems: a systematic literature review

MN Al-Mhiqani, T Alsboui, T Al-Shehari… - Computers and …, 2024 - Elsevier
The rapid expansion of cyber-physical systems (CPSs) has introduced new security
challenges, leading to the emergence of various threats, attacks, and controls aimed at …

Adaptive deep learning detection model for multi-foggy images

ZH Arif, MA Mahmoud, KH Abdulkareem, S Kadry… - IJIMAI, 2022 - dialnet.unirioja.es
The fog has different features and effects within every single environment. Detection whether
there is fog in the image is considered a challenge and giving the type of fog has a …

[PDF][PDF] An integrated imbalanced learning and deep neural network model for insider threat detection

MN Al-Mhiqani, R Ahmed, ZZ Abidin… - International Journal of …, 2021 - researchgate.net
The insider threat is a vital security problem concern in both the private and public sectors. A
lot of approaches available for detecting and mitigating insider threats. However, the …

Home based monitoring for smart health‐care systems: a survey

J Anu Shilvya, ST George… - Wireless …, 2022 - Wiley Online Library
Internet of Things (IoT) is one of the greatest advancements in technology especially in the
medical field. The interconnection of medical devices with the internet makes it easier to …

GMFITD: Graph Meta-Learning for Effective Few-Shot Insider Threat Detection

X Li, L Li, X Li, B Cai, J Jia, Y Gao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Insider threats represent a significant challenge in both corporate and governmental sectors.
Most existing supervised learning based detection methods that rely on transforming user …

Insider threat detection based on user behaviour analysis

M Singh, BM Mehtre, S Sangeetha - … , MIND 2020, Silchar, India, July 30 …, 2020 - Springer
Insider threat detection is a major challenge for security in organizations. They are the
employees/users of an organization, posing threat to it by performing any malicious activity …

A federated and explainable approach for insider threat detection in IoT

M Amiri-Zarandi, H Karimipour, RA Dara - Internet of Things, 2023 - Elsevier
An insider threat is a malicious action launched by authorized personnel inside the
organization. Since insider actions may only leave a small digital footprint in the system, it is …

A novel deep synthesis-based insider intrusion detection (DS-IID) model for malicious insiders and AI-generated threats

HM Kotb, T Gaber, S AlJanah, HM Zawbaa… - Scientific Reports, 2025 - nature.com
Insider threats pose a significant challenge to IT security, particularly with the rise of
generative AI technologies, which can create convincing fake user profiles and mimic …

[PDF][PDF] Time series activity classification using gated recurrent units

YF Tan, X Guo, SC Poh - International Journal of Electrical and …, 2021 - academia.edu
The population of elderly is growing and is projected to outnumber the youth in the future.
Many researches on elderly assisted living technology were carried out. One of the focus …