Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

Anomaly detection: A survey

V Chandola, A Banerjee, V Kumar - ACM computing surveys (CSUR), 2009 - dl.acm.org
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …

Deep learning approach for intelligent intrusion detection system

R Vinayakumar, M Alazab, KP Soman… - Ieee …, 2019 - ieeexplore.ieee.org
Machine learning techniques are being widely used to develop an intrusion detection
system (IDS) for detecting and classifying cyberattacks at the network-level and the host …

In-vehicle network intrusion detection using deep convolutional neural network

HM Song, J Woo, HK Kim - Vehicular Communications, 2020 - Elsevier
The implementation of electronics in modern vehicles has resulted in an increase in attacks
targeting in-vehicle networks; thus, attack detection models have caught the attention of the …

[图书][B] Data mining: the textbook

CC Aggarwal - 2015 - Springer
This textbook explores the different aspects of data mining from the fundamentals to the
complex data types and their applications, capturing the wide diversity of problem domains …

Cryptolock (and drop it): stopping ransomware attacks on user data

N Scaife, H Carter, P Traynor… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
Ransomware is a growing threat that encrypts auser's files and holds the decryption key until
a ransom ispaid by the victim. This type of malware is responsible fortens of millions of …

[图书][B] An introduction to outlier analysis

CC Aggarwal, CC Aggarwal - 2017 - Springer
Outliers are also referred to as abnormalities, discordants, deviants, or anomalies in the data
mining and statistics literature. In most applications, the data is created by one or more …

Mamadroid: Detecting android malware by building markov chains of behavioral models

E Mariconti, L Onwuzurike, P Andriotis… - arXiv preprint arXiv …, 2016 - arxiv.org
The rise in popularity of the Android platform has resulted in an explosion of malware threats
targeting it. As both Android malware and the operating system itself constantly evolve, it is …

Outlier detection for temporal data: A survey

M Gupta, J Gao, CC Aggarwal… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In the statistics community, outlier detection for time series data has been studied for
decades. Recently, with advances in hardware and software technology, there has been a …

Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version)

L Onwuzurike, E Mariconti, P Andriotis… - ACM Transactions on …, 2019 - dl.acm.org
As Android has become increasingly popular, so has malware targeting it, thus motivating
the research community to propose different detection techniques. However, the constant …