|
|
|
Karthikeyan Saminathan, Sai Tharun Reddy Mulka, Sangeetha Damodharan, Rajagopal Maheswar and Josip Lorincz
The COVID-19 pandemic made all organizations and enterprises work on cloud platforms from home, which greatly facilitates cyberattacks. Employees who work remotely and use cloud-based platforms are chosen as targets for cyberattacks. For that reason, cyb...
ver más
|
|
|
|
|
|
|
D. V. Smirnov
Pág. 88 - 94
The methodology of organization of search in Big Data, performed in the mode of limited time, of signs of malicious insider activities is discussed. The methodology is tested in a large industrial organization, the operating infrastructure of which cover...
ver más
|
|
|
|
|
|
|
Yaya Itai, Emmanuel Onwubiko
Pág. 3351 - 3358
The fear of fraud is constant. Unfortunately, now more than ever before, fraud is being committed by employees on the inside, the very people who are supposed to be supporting and protecting an organization. Even though the financial industry is one of t...
ver más
|
|
|
|
|
|
|
Wenjuan Li, Weizhi Meng and Lam For Kwok
Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing int...
ver más
|
|
|
|
|
|
|
Garfinkel, R. Gopal, R. Goes, P.
Pág. 749 - 764
|
|
|
|