The most detrimental cyber attacks are usually not originated by malicious outsiders or malware but from trusted insiders. The main advantage insider attackers have over external …
Zero trust architecture (ZTA) is a paradigm shift in how we protect data, stay connected and access resources. ZTA is non-perimeter-based defence, which has been emerging as a …
B Bin Sarhan, N Altwaijry - Applied Sciences, 2022 - mdpi.com
Insider threats pose a critical challenge for securing computer networks and systems. They are malicious activities by authorised users that can cause extensive damage, such as …
Insider threats are expensive, difficult to detect, and sadly, on the rise. Despite significant research efforts, existing approaches are inadequate in accuracy and precision. They also …
M Singh, BM Mehtre, S Sangeetha… - Journal of Ambient …, 2023 - Springer
Insider threats constitute a major cause of security breaches in organizations. They are the employees/users of an organization, causing harm by performing any malicious activity …
M Singh, BM Mehtre, S Sangeetha - Multimedia Tools and Applications, 2022 - Springer
Insider threats are a significant source of security breaches in organizations. They are often identified using machine and deep learning methods. These methods rely on predefined …
C Feltus - International Journal of Systems and Software Security …, 2022 - igi-global.com
Artificial intelligence and machine learning have recently made outstanding contributions to the performance of information system and cyber--physical system security. There has been …
Insider threats pose a significant challenge in cybersecurity, demanding advanced detection methods for effective risk mitigation. This paper presents a comparative evaluation of data …
Y Wei, KP Chow, SM Yiu - Forensic Science International: Digital …, 2021 - Elsevier
The complexity, concealment and infrequency of malicious internal actions make it difficult to detect insider threats. In the process of traditional reactive forensic investigation, analysis …