2018
DOI: 10.1016/j.procs.2017.12.085
|View full text |Cite
|
Sign up to set email alerts
|

A Probabilistic Approach for Guilty Agent Detection using Bigraph after Distribution of Sample Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 27 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…To upgrade the performance, it has turned into essentiality for an enterprise to share its critical data among numerous allegedly assured entities interior or exterior to its preface [1, 2 ] However, this shared data can be exposed by the malevolent entity that may induce a severe threat to the enterprise's privacy, confidentiality as well as functionality [3–5 ]. According to risk‐based security's ‘ RBS’ report, almost 7.9 billion data records caused by 5183 data breaches have been compromised surprisingly worldwide within the first nine months of 2019 only, which were 112 and 33.3% up, respectively, as compared to the same period in 2018 [6 ].…”
Section: Introductionmentioning
confidence: 99%
“…To upgrade the performance, it has turned into essentiality for an enterprise to share its critical data among numerous allegedly assured entities interior or exterior to its preface [1, 2 ] However, this shared data can be exposed by the malevolent entity that may induce a severe threat to the enterprise's privacy, confidentiality as well as functionality [3–5 ]. According to risk‐based security's ‘ RBS’ report, almost 7.9 billion data records caused by 5183 data breaches have been compromised surprisingly worldwide within the first nine months of 2019 only, which were 112 and 33.3% up, respectively, as compared to the same period in 2018 [6 ].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, data protection has become a challenging task in the area of information security. The identification of malicious entities can significantly assist to overcome the challenge existing in the area [7, 8]. Therefore, it attracts the researchers to propose models that recognise the guilty entity causing leakage of data for action against this entity.…”
Section: Introductionmentioning
confidence: 99%
“…The methods based on the probabilistic approach have been proposed in [7, 19, 2832]. These methods estimated the probability of being malicious for guilty agent identification.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The researchers discovered that despite the security policies, procedures, and tools currently in place, employees around the world are engaging in risky behaviours that put corporate and personal data at risk [14], [15]. Organizations provide easy access to databases for information sharing, storage and compression technology has allowed for more powerful (high-risk) endpoints [16], [17]. An 80-MB mobile device now holds 6000 Microsoft Word documents or 7, 20,000 emails, and new 64-GB removable devices allow an entire hard drive to be copied onto a device same as the size of a pack of gum.…”
Section: Introductionmentioning
confidence: 99%