2023 | Decision Support Systems | Citations: 0
Authors: Han, Kookyoung; Choi, Jin Hyuk; Choi, Yunsik; Lee, Gene Moo; Whinston, Andrew B.
Abstract: Modern cyberattacks such as advanced persistent threats have become sophisticate ... Expand
Semantic filters: intrusion detection system
Topics: IT security data breach electronic mail IT security threat intrusion detection system
Methods: first-hitting-time model optimization model
Theories: game theory lemon market theory
2023 | DESRIST | Citations: 0
Authors: Hornsteiner, Markus; Schönig, Stefan
Abstract: The Industrial Internet of Things (IIoT) paradigm means that “things” in an indu ... Expand
Semantic filters: intrusion detection system
Topics: Python evaluation criteria extensible markup language IT security requirements analysis
Methods: modeling language business process model and notation business process modeling personal interview design artifact
2023 | Information & Management | Citations: 0
Authors: Shiau, Wen-Lung; Wang, Xiaoqun; Zheng, Fei
Abstract: Information technology brings business success opportunities, but also causes po ... Expand
Semantic filters: intrusion detection system
Topics: privacy decision making intrusion detection system malware database system
Methods: co-citation analysis cluster analysis literature sample hierarchical clustering multidimensional scaling
2023 | HICSS | Citations: 0
Authors: Yang, B.; Hoffman, M.; Brown, N.
Abstract: The challenge of cyberattack detection can be illustrated by the complexity of ... Expand
Semantic filters: intrusion detection system
Topics: shapley additive explanation application programming interface Python Microsoft Windows intrusion detection system
Methods: random forest classification naïve bayes machine learning cluster analysis experiment
2023 | Information Systems Frontiers | Citations: 1
Authors: Sewak, Mohit; Sahay, Sanjay K.; Rathore, Hemant
Abstract: The cybersecurity threat landscape has lately become overly complex. Threat acto ... Expand
Semantic filters: intrusion detection system
Topics: mobile system denial of service attack internet of things IT security malware
Methods: machine learning computational algorithm deep learning reinforcement learning supervised learning
2022 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Rashid, A. N. M. Bazlur; Ahmed, Mohiuddin; Sikos, Leslie F.; Haskell-Dowland, Paul
Abstract: Anomaly detection from Big Cybersecurity Datasets is very important; however, th ... Expand
Semantic filters: intrusion detection system
Topics: Microsoft Windows IT security intrusion detection system spreadsheet missing data
Methods: anomaly detection machine learning computational algorithm experiment simulation
Theories: co-evolution theory
2022 | Information & Management | Citations: 11
Authors: Schlackl, Frederic; Link, Nico; Hoehle, Hartmut
Abstract: Research on data breaches is scattered across disciplines and methodologies. To ... Expand
Semantic filters: intrusion detection system
Topics: data breach database system data security ergonomics usability
Methods: literature sample econometric modeling literature study structured literature research event study
Theories: organizational behavior theory
2022 | Communications of the Association for Information Systems | Citations: 0
Authors: Sen, Ravi; Heim, Gregory; Zhu, Qilong
Abstract: The availability of massive amounts of data, fast computers, and superior machi ... Expand
Semantic filters: intrusion detection system
Topics: IT security artificial intelligence malware fake news accounting
Methods: decision tree classification machine learning computational algorithm supervised learning survey
2021 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Abdibayev, Almas; Chen, Dongkai; Chen, Haipeng; Poluru, Deepti; Subrahmanian, V. S.
Abstract: Theft of intellectual property is a growing problem—one that is exacerbated by t ... Expand
Semantic filters: intrusion detection system
Topics: information retrieval knowledge representation IT security Google+ innovation management
Methods: optimization model word embedding term frequency–inverse document frequency experiment ontological modelling
2021 | Information Systems Frontiers | Citations: 0
Authors: Baksi, Rudra P.; Upadhyaya, Shambhu J.
Abstract: Deception has been proposed in the literature as an effective defense mechanism ... Expand
Semantic filters: intrusion detection system
Topics: ransomware malware computer hardware intrusion detection system pandemic
Methods: computational algorithm hidden Markov model literature study experiment