标题
A new intelligent multilayer framework for insider threat detection
作者
关键词
Insider threat, Cybersecurity, Classification, Entropy, VIKOR
出版物
COMPUTERS & ELECTRICAL ENGINEERING
Volume 97, Issue -, Pages 107597
出版商
Elsevier BV
发表日期
2021-11-23
DOI
10.1016/j.compeleceng.2021.107597
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Multi-Criteria Decision-Making (MCDM) for the Assessment of Renewable Energy Technologies in a Household: A Review
- (2020) Indre Siksnelyte-Butkiene et al. Energies
- A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations
- (2020) Mohammed Nasser Al-Mhiqani et al. Applied Sciences-Basel
- Mitigating Insider Threats Using Bio-Inspired Models
- (2020) Andreas Nicolaou et al. Applied Sciences-Basel
- A Survey of Random Forest Based Methods for Intrusion Detection Systems
- (2018) Paulo Angelo Alves Resende et al. ACM COMPUTING SURVEYS
- Data exfiltration: A review of external attack vectors and countermeasures
- (2018) Faheem Ullah et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Distance Measurement Methods for Improved Insider Threat Detection
- (2018) Owen Lo et al. Security and Communication Networks
- Systematic Review of an Automated Multiclass Detection and Classification System for Acute Leukaemia in Terms of Evaluation and Benchmarking, Open Challenges, Issues and Methodological Aspects
- (2018) M. A. Alsalem et al. JOURNAL OF MEDICAL SYSTEMS
- A New Model for Determining Weight Coefficients of Criteria in MCDM Models: Full Consistency Method (FUCOM)
- (2018) Dragan Pamučar et al. Symmetry-Basel
- Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams
- (2017) Brock Bose et al. IEEE Systems Journal
- Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
- (2017) Philip A. Legg et al. IEEE Systems Journal
- Towards on Develop a Framework for the Evaluation and Benchmarking of Skin Detectors Based on Artificial Intelligent Models Using Multi-Criteria Decision-Making Techniques
- (2017) Qahtan M. Yas et al. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE
- Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence
- (2014) D. Shalini Punithavathani et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- A fuzzy VIKOR method for supplier selection based on entropy measure for objective weighting
- (2011) Ali Shemshadi et al. EXPERT SYSTEMS WITH APPLICATIONS
- Determination of weights for ultimate cross efficiency using Shannon entropy
- (2010) Jie Wu et al. EXPERT SYSTEMS WITH APPLICATIONS
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started