Fog Computing enables the efficient offloading of computational tasks from IoT Devices to Fog nodes, enhancing processing efficiency and reducing latency. This paper introduces the Dynamic Matching with Deferred Accep...
详细信息
Our research aims to investigate how reinforcement learning methods can be applied to develop a movie recommendation system. We frame the issue of interactive recommendation as a contextual multi-armed bandit, where t...
详细信息
Grape is highly esteemed as a significant agricultural crop in Bangladesh. Plant diseases primarily result from the presence of pathogens and pest insects, leading to a significant decline in productivity if not prope...
详细信息
Real-time video transmission via unmanned aerial vehicles (UAVs) is significantly impacted by latency issues. Using Region of Interest (ROI) tile segmentation methods, video streaming techniques can dynamically adjust...
详细信息
Intelligent reflecting surfaces (IRS) that can dynamically control the phase of radio waves and reflect them are attracting attention to realize non line-of-sight communication in the high-frequency band. Channel stat...
详细信息
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulti...
详细信息
ISBN:
(纸本)9798350362480
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulting in less attention and development in this critical area. Conventional ITD approaches often rely heavily on event-driven approaches. On top of that, researchers developed various rule-based methods to conquer the tasks. Based on that, we often ignore the intrinsic temporal relationships that are naturally built in between events that occur in different moments. For instance, we may easily understand events with causality such as one anomalous event followed by another specific event to complete a malicious action;however, may not be aware of events that occur around 9 am every morning during working hours. In our opinion, we attempt to re-consider the temporal behavior to extract the information hidden in cyberspace activities. Specifically, some effective sentence embeddings can assist us in providing informative internal representations to summarize temporal behaviors in the temporal activity sequences to make the right judgment on insider threat detection. In this paper, we propose a novel methodology for insider threat detection that emphasizes temporal relationship modeling on top of already-matured event sequence analysis to effectively catch insider threats. The proposed approach leverages contrastive sentence embeddings to learn users' intentions in sequences, followed by the deployment of a user-level and event-level Contrastive Learning (euCL) model to incorporate temporal behaviors with user behavior embeddings. To validate the proposed methodology, we conduct extensive analyses and experiments using the publicly available CERT dataset. The results demonstrate the effectiveness and robustness of the proposed method in detecting insider threats and identifying malicious scenarios, highlighting its potential for enhancing cybersecurity measur
Given the rapid advancements in technologies such as the metaverse and digital twins, the need for effective integration of communication, computation, and storage in complex systems and edge computing environments is...
详细信息
Tuberculosis (TB) is a chronic lung disease that constitutes one of the top 10 global causes of death. Timely and precise identification of TB is critical, as untreated cases can pose life-threatening risks. Tradition...
详细信息
Intelligent Reflecting Surfaces (IRS) is attracting attention for wireless communications at high-frequency band. IRS can control radio propagation by reflecting radio waves and shifting their phase. As one of the met...
详细信息
Globally, heart disease poses a significant challenge to public health. Early identification is crucial for effectively managing and treating heart conditions. Machine learning has shown promising results in predictin...
详细信息
暂无评论