Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulti...
详细信息
ISBN:
(纸本)9798350362480
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulting in less attention and development in this critical area. Conventional ITD approaches often rely heavily on event-driven approaches. On top of that, researchers developed various rule-based methods to conquer the tasks. Based on that, we often ignore the intrinsic temporal relationships that are naturally built in between events that occur in different moments. For instance, we may easily understand events with causality such as one anomalous event followed by another specific event to complete a malicious action;however, may not be aware of events that occur around 9 am every morning during working hours. In our opinion, we attempt to re-consider the temporal behavior to extract the information hidden in cyberspace activities. Specifically, some effective sentence embeddings can assist us in providing informative internal representations to summarize temporal behaviors in the temporal activity sequences to make the right judgment on insider threat detection. In this paper, we propose a novel methodology for insider threat detection that emphasizes temporal relationship modeling on top of already-matured event sequence analysis to effectively catch insider threats. The proposed approach leverages contrastive sentence embeddings to learn users' intentions in sequences, followed by the deployment of a user-level and event-level Contrastive Learning (euCL) model to incorporate temporal behaviors with user behavior embeddings. To validate the proposed methodology, we conduct extensive analyses and experiments using the publicly available CERT dataset. The results demonstrate the effectiveness and robustness of the proposed method in detecting insider threats and identifying malicious scenarios, highlighting its potential for enhancing cybersecurity measur
Conventional lexicon-based approaches to sentiment analysis typically lack the necessary methods to properly identify the negation window, making it impossible to model negation. An enormous increase in sentiment-rich...
详细信息
ISBN:
(纸本)9798350359688
Conventional lexicon-based approaches to sentiment analysis typically lack the necessary methods to properly identify the negation window, making it impossible to model negation. An enormous increase in sentiment-rich electronic and social media has been observed daily. Negation modifiers cause problems for Sentiment Classification techniques and have the power to entirely change the discourse's meaning. Therefore, it becomes essential to manage them well. Opinion mining or sentiment analysis is the study of people's attitudes, feelings, and views as they are expressed in written language. It is one of the busiest text mining and natural language processing research projects. Even though sentiment analysis research has gained popularity in the field of natural language processing, for this problem, the state-of-the-art machine learning approach is based on Bag of Words. But the BOW model pays little attention to polarity shift, which could have a distinct overall effect. One of the main issues with doing sentimental analysis on any given text or sentence is handling polarity shift, which is what this study attempts to address. Sentiment analysis use Natural Language Processing principles to identify negation in the text. Our goal is to identify the negation effect on customer reviews that, although appearing good, are actually negative. The suggested modified negation methodology helps to increase classification accuracy by providing a method for computing negation identification. In terms of review classification by accuracy, precision, and recall, this approach yielded a noteworthy outcome. When test and training data are from distinct domains, machine learning faces the challenge of domain generalization. Despite the large body of research on cross-domain text classification, the majority of current methods concentrate on one-to-one or many-to-one domain adaptation. Our domain generalization method regularly outperforms state-of-the-art domain adaption methods, a
The paper employed a range of ensemble learning techniques to forecast Chemical Oxygen Demand (COD) levels in Wastewater Treatment Plants (WWTP). By harnessing ensemble learning, the main objective is to enhance the a...
详细信息
We propose an improved method to generate high-quality distributed representations of words. In our previous paper, we introduced a novel method to obtain distributed representations of words with BERT using Wiktionar...
详细信息
With the recent development of information technology, the importance of protecting personal information has increased. Because of the vulnerability in passwords, biometric authentication is now being used as a method...
详细信息
To suppress the resonance in an LCL filter, the passive damping method is often favored over the active damping due to its simplicity and robustness. However, the passive damping suffers from decreasing LCL filter'...
详细信息
Natural Language Processing (NLP) is revolutionizing the legal domain, enabling tasks such as predicting legal outcomes, summarizing complex documents, identifying key entities, and assessing bail risks. This survey p...
详细信息
Mobile healthcare has attracted significant attention in recent years as people have become more health-conscious. Furthermore, there is an increasing demand for non-contact and non-invasive diagnostic methods to redu...
详细信息
Analyzing website performance is crucial for optimizing a site's functionality, enhancing user engagement, and aligning with business goals. This evaluation focuses on essential metrics such as average engagement ...
详细信息
This paper introduces a robust and effective methodology for addressing the dynamic economic dispatch (DED) optimization problem, which is pivotal in power system operations and planning. DED is basically an enhanced ...
详细信息
暂无评论