UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1
hits: 5
1.
  • Handling Insider Threat Thr... Handling Insider Threat Through Supervised Machine Learning Techniques
    Janjua, Faisal; Masood, Asif; Abbas, Haider ... Procedia computer science, 2020, 2020-00-00, Volume: 177
    Journal Article
    Peer reviewed
    Open access

    Information technology systems face increasing cyber security threats, mostly from insiders. Network security mechanism for insiders are not as strict as for rest. Also insider can easily bypass ...
Full text

PDF
2.
  • Textual analysis of traitor... Textual analysis of traitor-based dataset through semi supervised machine learning
    Janjua, Faisal; Masood, Asif; Abbas, Haider ... Future generation computer systems, December 2021, 2021-12-00, Volume: 125
    Journal Article
    Peer reviewed

    Insider threats are one of the most challenging and growing security threats which the government agencies, organizations, and institutions face. In such scenarios, malicious (red) activities are ...
Full text
3.
Full text

PDF
4.
  • A Systematic Review on Deep... A Systematic Review on Deep-Learning-Based Phishing Email Detection
    Thakur, Kutub; Ali, Md Liakat; Obaidat, Muath A. ... Electronics (Basel), 11/2023, Volume: 12, Issue: 21
    Journal Article
    Peer reviewed
    Open access

    Phishing attacks are a growing concern for individuals and organizations alike, with the potential to cause significant financial and reputational damage. Traditional methods for detecting phishing ...
Full text
5.
Full text

PDF

Load filters