Semantic Filter
show all semantic filters
Found 96 articles
  • Security defense against long-term and stealthy cyberattacks

    PDF

    2023 | Decision Support Systems | Citations: 0

    Authors: Han, Kookyoung; Choi, Jin Hyuk; Choi, Yunsik; Lee, Gene Moo; Whinston, Andrew B.

    Abstract: Modern cyberattacks such as advanced persistent threats have become sophisticate ... Expand

    Semantic filters: intrusion detection system

    Topics: IT security data breach electronic mail IT security threat intrusion detection system

    Methods: first-hitting-time model optimization model

    Theories: game theory lemon market theory

  • SIREN: Designing Business Processes for Comprehensive Industrial IoT Security Management

    PDF

    2023 | DESRIST | Citations: 0

    Authors: Hornsteiner, Markus; Schönig, Stefan

    Abstract: The Industrial Internet of Things (IIoT) paradigm means that “things” in an indu ... Expand

    Semantic filters: intrusion detection system

    Topics: Python evaluation criteria extensible markup language IT security requirements analysis

    Methods: modeling language business process model and notation business process modeling personal interview design artifact

  • What are the trend and core knowledge of information security? A citation and co-citation analysis

    PDF

    2023 | Information & Management | Citations: 0

    Authors: Shiau, Wen-Lung; Wang, Xiaoqun; Zheng, Fei

    Abstract: Information technology brings business success opportunities, but also causes po ... Expand

    Semantic filters: intrusion detection system

    Topics: privacy decision making intrusion detection system malware database system

    Methods: co-citation analysis cluster analysis literature sample hierarchical clustering multidimensional scaling

  • Bayesian Networks for Interpretable Cyberattack Detection

    2023 | HICSS | Citations: 0

    Authors: Yang, B.; Hoffman, M.; Brown, N.

    Abstract: The challenge of cyberattack detection can be illustrated by the complexity of ... Expand

    Semantic filters: intrusion detection system

    Topics: shapley additive explanation application programming interface Python Microsoft Windows intrusion detection system

    Methods: random forest classification naïve bayes machine learning cluster analysis experiment

  • Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection

    PDF

    2023 | Information Systems Frontiers | Citations: 1

    Authors: Sewak, Mohit; Sahay, Sanjay K.; Rathore, Hemant

    Abstract: The cybersecurity threat landscape has lately become overly complex. Threat acto ... Expand

    Semantic filters: intrusion detection system

    Topics: mobile system denial of service attack internet of things IT security malware

    Methods: machine learning computational algorithm deep learning reinforcement learning supervised learning

  • Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection

    PDF

    2022 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Rashid, A. N. M. Bazlur; Ahmed, Mohiuddin; Sikos, Leslie F.; Haskell-Dowland, Paul

    Abstract: Anomaly detection from Big Cybersecurity Datasets is very important; however, th ... Expand

    Semantic filters: intrusion detection system

    Topics: Microsoft Windows IT security intrusion detection system spreadsheet missing data

    Methods: anomaly detection machine learning computational algorithm experiment simulation

    Theories: co-evolution theory

  • Antecedents and consequences of data breaches: A systematic review

    PDF

    2022 | Information & Management | Citations: 11

    Authors: Schlackl, Frederic; Link, Nico; Hoehle, Hartmut

    Abstract: Research on data breaches is scattered across disciplines and methodologies. To ... Expand

    Semantic filters: intrusion detection system

    Topics: data breach database system data security ergonomics usability

    Methods: literature sample econometric modeling literature study structured literature research event study

    Theories: organizational behavior theory

  • Artificial Intelligence and Machine Learning in Cybersecurity: Applications, Challenges, and Opportunities for MIS Academics

    PDF

    2022 | Communications of the Association for Information Systems | Citations: 0

    Authors: Sen, Ravi; Heim, Gregory; Zhu, Qilong

    Abstract: The availability of massive amounts of data, fast computers, and superior machi ... Expand

    Semantic filters: intrusion detection system

    Topics: IT security artificial intelligence malware fake news accounting

    Methods: decision tree classification machine learning computational algorithm supervised learning survey

  • Using Word Embeddings to Deter Intellectual Property Theft through Automated Generation of Fake Documents

    PDF

    2021 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Abdibayev, Almas; Chen, Dongkai; Chen, Haipeng; Poluru, Deepti; Subrahmanian, V. S.

    Abstract: Theft of intellectual property is a growing problem—one that is exacerbated by t ... Expand

    Semantic filters: intrusion detection system

    Topics: information retrieval knowledge representation IT security Google+ innovation management

    Methods: optimization model word embedding term frequency–inverse document frequency experiment ontological modelling

  • Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats

    PDF

    2021 | Information Systems Frontiers | Citations: 0

    Authors: Baksi, Rudra P.; Upadhyaya, Shambhu J.

    Abstract: Deception has been proposed in the literature as an effective defense mechanism ... Expand

    Semantic filters: intrusion detection system

    Topics: ransomware malware computer hardware intrusion detection system pandemic

    Methods: computational algorithm hidden Markov model literature study experiment