Real-time video transmission via unmanned aerial vehicles (UAVs) is significantly impacted by latency issues. Using Region of Interest (ROI) tile segmentation methods, video streaming techniques can dynamically adjust...
详细信息
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulti...
详细信息
ISBN:
(纸本)9798350362480
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulting in less attention and development in this critical area. Conventional ITD approaches often rely heavily on event-driven approaches. On top of that, researchers developed various rule-based methods to conquer the tasks. Based on that, we often ignore the intrinsic temporal relationships that are naturally built in between events that occur in different moments. For instance, we may easily understand events with causality such as one anomalous event followed by another specific event to complete a malicious action;however, may not be aware of events that occur around 9 am every morning during working hours. In our opinion, we attempt to re-consider the temporal behavior to extract the information hidden in cyberspace activities. Specifically, some effective sentence embeddings can assist us in providing informative internal representations to summarize temporal behaviors in the temporal activity sequences to make the right judgment on insider threat detection. In this paper, we propose a novel methodology for insider threat detection that emphasizes temporal relationship modeling on top of already-matured event sequence analysis to effectively catch insider threats. The proposed approach leverages contrastive sentence embeddings to learn users' intentions in sequences, followed by the deployment of a user-level and event-level Contrastive Learning (euCL) model to incorporate temporal behaviors with user behavior embeddings. To validate the proposed methodology, we conduct extensive analyses and experiments using the publicly available CERT dataset. The results demonstrate the effectiveness and robustness of the proposed method in detecting insider threats and identifying malicious scenarios, highlighting its potential for enhancing cybersecurity measur
A circuit technique for increasing the maximum output voltage slew rate (SR) of an integrated operational amplifier (OpAmp) with the HA2700 microchip architecture based on the modernization of the input differential s...
详细信息
Silicon nitride waveguides play a leading role in photonic system integration. Silicon nitride leverages unique low-loss passive functions, mature deposition techniques of low-pressure chemical vapor deposition and pl...
详细信息
This article presents a simple, high-gain, E-shaped antenna suitable for 5G applications in the unlicensed 60 GHz band, characterized by high absorption and path losses. In order to optimize the reflection coefficient...
详细信息
This paper presents a quasi-neural network (QuasiNN) based parametric channel estimation for multiple inputs and multiple outputs with orthogonal frequency division multiplexing (MIMO-OFDM) systems. This approach join...
详细信息
Outliers are the data points that vary significantly from the primary distribution of data. In data mining, determining outliers is an essential task for establishing the data quality, decision-making, and models'...
详细信息
Due to diverse software vulnerabilities and hardware attacks, user credentials are vulnerable or could land in demilitarized zones. An attempt is made to explore and finally proposed a trust based malware detection ba...
详细信息
According to numerous calculations, the global food output must significantly increase by 2050. Additionally, water levels have been declining, and there is a shortage of usable agricultural land. The first step to in...
详细信息
The emergence of quantum computing poses a significant threat to the security of traditional blockchain systems, which rely heavily on classical cryptographic algorithms. To safeguard the integrity and reliability of ...
详细信息
暂无评论