An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques
Authors
Keywords
-
Journal
Entropy
Volume 23, Issue 10, Pages 1258
Publisher
MDPI AG
Online
2021-09-28
DOI
10.3390/e23101258
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Deep learning for insider threat detection: Review, challenges and opportunities
- (2021) Shuhan Yuan et al. COMPUTERS & SECURITY
- Detecting Insider Threat via a Cyber-Security Culture Framework
- (2021) Anna Georgiadou et al. JOURNAL OF COMPUTER INFORMATION SYSTEMS
- A Multi-Tiered Framework for Insider Threat Prevention
- (2021) Rakan A. Alsowail et al. Electronics
- Survival analysis for insider threat
- (2021) Elie Alhajjar et al. Computational and Mathematical Organization Theory
- Using alternate reality games to find a needle in a haystack: An approach for testing insider threat detection methods
- (2021) Shannon Wasko et al. COMPUTERS & SECURITY
- Anomaly Detection for Insider Threats Using Unsupervised Ensembles
- (2021) Duc C. Le et al. IEEE Transactions on Network and Service Management
- Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning
- (2020) Duc C. Le et al. IEEE Transactions on Network and Service Management
- A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations
- (2020) Mohammed Nasser Al-Mhiqani et al. Applied Sciences-Basel
- Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection
- (2020) Zhihong Tian et al. MOBILE NETWORKS & APPLICATIONS
- Insight Into Insiders and IT
- (2019) Ivan Homoliak et al. ACM COMPUTING SURVEYS
- Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms
- (2019) Kim et al. Applied Sciences-Basel
- Detecting and Preventing Cyber Insider Threats: A Survey
- (2018) Liu Liu et al. IEEE Communications Surveys and Tutorials
- Beyond one-hot encoding: Lower dimensional target embedding
- (2018) Pau Rodríguez et al. IMAGE AND VISION COMPUTING
- Micromovement Behavior as an Intention Detection Measurement for Preventing Insider Threats
- (2018) Abdulaziz Almehmadi IEEE Access
- An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks
- (2018) Taher Al-Shehari et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams
- (2017) Brock Bose et al. IEEE Systems Journal
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- Network Anomaly Detection: Methods, Systems and Tools
- (2013) Monowar H. Bhuyan et al. IEEE Communications Surveys and Tutorials
- On the effectiveness of preprocessing methods when dealing with different levels of class imbalance
- (2011) V. García et al. KNOWLEDGE-BASED SYSTEMS
- Comparing machine learning classifiers in potential distribution modelling
- (2010) Ana C. Lorena et al. EXPERT SYSTEMS WITH APPLICATIONS
- Detecting Insider Theft of Trade Secrets
- (2009) D. Caputo et al. IEEE SECURITY & PRIVACY
- A systematic analysis of performance measures for classification tasks
- (2009) Marina Sokolova et al. INFORMATION PROCESSING & MANAGEMENT
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started