2019
DOI: 10.1016/j.eswa.2019.05.043
|View full text |Cite
|
Sign up to set email alerts
|

Employee profiling via aspect-based sentiment and network for insider threats detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(15 citation statements)
references
References 25 publications
0
15
0
Order By: Relevance
“…Chi et al [123], focused on the detection of insider threats by combining linguistic analysis and K-means algorithm to analyze communications, such as emails, to ascertain whether an employee meets certain personality criteria and to deduce the risk level for each employee. Soh et al [124] focused on an aspect-based sentiment analysis that can provide more detailed information. Moreover, they presented a novel employee profiling framework equipped with deep learning models for insider threat detection, which is based on aspect-based sentiment and social network information.…”
Section: Email Miningmentioning
confidence: 99%
“…Chi et al [123], focused on the detection of insider threats by combining linguistic analysis and K-means algorithm to analyze communications, such as emails, to ascertain whether an employee meets certain personality criteria and to deduce the risk level for each employee. Soh et al [124] focused on an aspect-based sentiment analysis that can provide more detailed information. Moreover, they presented a novel employee profiling framework equipped with deep learning models for insider threat detection, which is based on aspect-based sentiment and social network information.…”
Section: Email Miningmentioning
confidence: 99%
“…Sentiment analysis can be understood as reflecting specific corpus to different sentiment categories. After giving corpus and tags, sentiment analysis is performed as the following operations [35]:…”
Section: Framework Of Concept-bertmentioning
confidence: 99%
“…Tabash and Happa [183] combined computer emergency response team (CERT) logs with the knowledge of security experts in their system by having the analysts classify detected anomalies. Soh et al [184] used email, personality traits, and implicit motives to profile employees using a gated recurrent unit and Skip-gram. Nithiyanandam et al [185] proposed a layered defense based on data monitoring, activity monitoring, user authentication, resource monitoring, and an overarching defense manager.…”
Section: Other Behaviorsmentioning
confidence: 99%
“…First, insiders with trusted access can perform unauthorized activities. Thus, external network security tools, such as firewalls, IDS, and antivirus software, cannot detect a malicious insider [93,147,184,189]. Second, insider attacks manifest in many forms.…”
Section: Complexity Of Insider Threat Detectionmentioning
confidence: 99%
See 1 more Smart Citation