Malicious Insider Attack Detection in IoTs Using Data Analytics
暂无分享,去创建一个
Rabia Latif | Seemab Latif | Tanzila Saba | Shahzaib Tahir | Ahmed Yar Khan | Gohar Batool | T. Saba | R. Latif | Seemab Latif | Shahzaib Tahir | Gohar Batool
[1] Nikolaos Pitropakis,et al. Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[2] Florian Kammüller,et al. Isabelle Modelchecking for Insider Threats , 2016, DPM/QASA@ESORICS.
[3] William J. Buchanan,et al. Distance Measurement Methods for Improved Insider Threat Detection , 2018, Secur. Commun. Networks.
[4] Frederic P. Miller,et al. Levenshtein Distance: Information theory, Computer science, String (computer science), String metric, Damerau?Levenshtein distance, Spell checker, Hamming distance , 2009 .
[5] Yan Huang,et al. A fuzzy multicriteria aggregation method for data analytics: Application to insider threat monitoring , 2017, 2017 Joint 17th World Congress of International Fuzzy Systems Association and 9th International Conference on Soft Computing and Intelligent Systems (IFSA-SCIS).
[6] Sartaj Sahni,et al. String correction using the Damerau-Levenshtein distance , 2019, BMC Bioinformatics.
[7] Yanbing Liu,et al. Insider Threat Detection with Deep Neural Network , 2018, ICCS.
[8] Ronald Rousseau,et al. Similarity measures in scientometric research: The Jaccard index versus Salton's cosine formula , 1989, Inf. Process. Manag..
[9] Jin Kwak,et al. System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats , 2018, KSII Trans. Internet Inf. Syst..
[10] Liping Han,et al. Distance Weighted Cosine Similarity Measure for Text Classification , 2013, IDEAL.
[11] Srikanta Tirthapura,et al. Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams , 2017, IEEE Systems Journal.
[12] Jason R. C. Nurse,et al. A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models , 2016, MIST@CCS.
[13] Florian Kammüller,et al. Attack Tree Analysis for Insider Threats on the IoT Using Isabelle , 2016, HCI.
[14] Sadie Creese,et al. Automated Insider Threat Detection System Using User and Role-Based Profile Assessment , 2017, IEEE Systems Journal.
[15] Sadie Creese,et al. Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things , 2015, 2015 International Workshop on Secure Internet of Things (SIoT).
[16] Sayan Kumar Ray,et al. Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..