Insider threats detection model for email content using statistical analysis
An insider threat has become one of the most challenging malicious activities in cybersecurity defence systems in a contrast to outsider threats recently. Usually, IP theft, fraud and sabotage against legal information are three well-known types of insider threat. Since an insider threat usually exp...
| Main Author: | Mohammad, Nur Ameera Natasha |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2022
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/26927/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=122122 |
| Abstract | Abstract here |
Similar Items
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
by: Abu, Md Sahrom
Published: (2021)
by: Abu, Md Sahrom
Published: (2021)
Statistical modelling and inference for a class of bivariate and related distributions / Ng Choung Min
by: Ng, Choung Min
Published: (2010)
by: Ng, Choung Min
Published: (2010)
Unintentional Insider Threats Countermeasure Model (UITCM) in Reducing Internal Threat Environment
by: Zainab. A. A.Abdelsadeq
Published: (2024)
by: Zainab. A. A.Abdelsadeq
Published: (2024)
Analysis performance of database programming for computation in statistical application
by: Abdul Rahid @ Abdul Rashid, Nurul Najwa
Published: (2015)
by: Abdul Rahid @ Abdul Rashid, Nurul Najwa
Published: (2015)
Statistical methods for computer aided diagnosis in chest radiography / Hossein Ebrahimian
by: Ebrahimian, Hossein
Published: (2013)
by: Ebrahimian, Hossein
Published: (2013)
Optimised hybrid deep learning models for integrated energy modelling and anomaly detection under IPMVP compliance
by: Sukarti, Suziee
Published: (2025)
by: Sukarti, Suziee
Published: (2025)
Enhancing anomaly detection performance in imbalanced datasets using a deep generative model and Tomeklinks approach
by: Barkah, Azhari Shouni
Published: (2025)
by: Barkah, Azhari Shouni
Published: (2025)
Risk profile matrix enhancement for insider Threat prediction
by: Iszaida Ismail
Published: (2025)
by: Iszaida Ismail
Published: (2025)
The development of insider threat prevention framework within organization
by: Rahimah Mohamad Zuwita@Abu Bakar
Published: (2023)
by: Rahimah Mohamad Zuwita@Abu Bakar
Published: (2023)
Constructing Polymorphic Virus Analysis System Using Behavior Detection Approach
by: Fauzi Adi, Rafrastara
Published: (2010)
by: Fauzi Adi, Rafrastara
Published: (2010)
Constructing polymorphic virus analysis system using behavior detection approach
by: Rasrastara, Fauzi Adi
Published: (2010)
by: Rasrastara, Fauzi Adi
Published: (2010)
Dimension Reduction For Classification Using Principal Component Analysis (PCA) To Detect Malicious Executables
by: Jamal, Zalifh
Published: (2017)
by: Jamal, Zalifh
Published: (2017)
Estimation and outlier detection of random coefficient autoregressive models / Norli Anida binti Abdullah
by: Abdullah, Norli Anida
Published: (2009)
by: Abdullah, Norli Anida
Published: (2009)
Statistical downscaling of projecting rainfall amount based on SVC-RVM model
by: Nurul Ainina Filza Sulaiman
Published: (2022)
by: Nurul Ainina Filza Sulaiman
Published: (2022)
Development of dance movement model using Laban movement analysis
by: Sutopo, Joko
Published: (2023)
by: Sutopo, Joko
Published: (2023)
Tuberculosis Model : A Mathematical Analysis / Nadhirah bt Abdul Halim
by: Abdul Halim, Nadhirah
Published: (2013)
by: Abdul Halim, Nadhirah
Published: (2013)
Outlier detection in cylindrical data / Nurul Hidayah Sadikon
by: Nurul Hidayah , Sadikon
Published: (2018)
by: Nurul Hidayah , Sadikon
Published: (2018)
Improved robust estimator and clustering procedures for multivariate outliers detection
by: Sharifah Sakinah, Syed Abd Mutalib
Published: (2023)
by: Sharifah Sakinah, Syed Abd Mutalib
Published: (2023)
Multi-label risk diabetes complication prediction model using deep neural network with multi-channel weighted dropout
by: Dzakiyullah, Nur Rachman
Published: (2025)
by: Dzakiyullah, Nur Rachman
Published: (2025)
Identify Human Error In Using Mobile Device That Lead To Security Threat
by: Abdul Mubin, Norzul Masri
Published: (2017)
by: Abdul Mubin, Norzul Masri
Published: (2017)
Automated Deform Detection For Automotive Body Panels Using Image Processing Techniques
by: Edris, Muhammad Zuhair Bolqiah
Published: (2016)
by: Edris, Muhammad Zuhair Bolqiah
Published: (2016)
Transformer-based sentiment analysis classification in natural language processing for Bahasa Melayu
by: Zulkalnain, Mohd Asyraf
Published: (2025)
by: Zulkalnain, Mohd Asyraf
Published: (2025)
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
by: Mohd Yusoff, Mohd Izhan
Published: (2014)
by: Mohd Yusoff, Mohd Izhan
Published: (2014)
Development of relationship model between learning environment,psychological characteristics and higher order thinking skills in statistics education
by: Mohd Azry Abdul Malik
Published: (2018)
by: Mohd Azry Abdul Malik
Published: (2018)
Statistical Modelling For Forecasting Pm10 Concentrations In Peninsular Malaysia
by: Ng, Kar Yong
Published: (2017)
by: Ng, Kar Yong
Published: (2017)
The virtual reality model of mathematical word problems for autistic children
by: Rosli, Zareena
Published: (2025)
by: Rosli, Zareena
Published: (2025)
Exploring insider threats using organisational performance framework in Malaysian manufacturing case
by: Isnin, Siti Norfatihah
Published: (2024)
by: Isnin, Siti Norfatihah
Published: (2024)
A comparative analysis of Parkinson’s disease classification using artificial intelligent techniques for mobile application
by: Lee, Teng Hong
Published: (2025)
by: Lee, Teng Hong
Published: (2025)
Detection and prevention for SQL injection attacks in stored procedures using real time web application
by: Salih Ali, Nabeel
Published: (2015)
by: Salih Ali, Nabeel
Published: (2015)
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
by: Mohd Foozy, Cik Feresa
Published: (2017)
by: Mohd Foozy, Cik Feresa
Published: (2017)
Statistical modeling of annual maximum river flow in Sabah
by: Nur Farhanah Kahal Musakkal
Published: (2017)
by: Nur Farhanah Kahal Musakkal
Published: (2017)
Mobile application for Solanaceous crop health diagnosis and treatment using a lightweight YOLO Model
by: Khan, Asar
Published: (2025)
by: Khan, Asar
Published: (2025)
Duplicates detection approach within incomplete data sets using dynamic sorting key and hot deck compensation method
by: Abdulrahim, Abdulrazzak Ali Mohamed
Published: (2022)
by: Abdulrahim, Abdulrazzak Ali Mohamed
Published: (2022)
New Test Statistics To Assess The
Goodness-Of-Fit Of
Logistic Regression Models
by: Hussain, Jassim Nassir
Published: (2013)
by: Hussain, Jassim Nassir
Published: (2013)
Mining Student's Performance in SPM Using Statistics and Neural Networks for Technical Subject
by: Mohamed Ridzuan, Abdul Latiff
Published: (2009)
by: Mohamed Ridzuan, Abdul Latiff
Published: (2009)
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
by: Ong, Phaik Ling
Published: (2016)
by: Ong, Phaik Ling
Published: (2016)
Bayesian approach to errors-in-variables in count data regression models / Nur Aainaa Rozliman
by: Nur Aainaa , Rozliman
Published: (2018)
by: Nur Aainaa , Rozliman
Published: (2018)
Modeling loss data with composite models / Mastoureh Maghsoudi
by: Mastoureh , Maghsoudi
Published: (2016)
by: Mastoureh , Maghsoudi
Published: (2016)
The application of Malaysian cyber security laws in regulating cyber insider threats in Malaysian organisations
by: Afiqah, Abdul Razak
Published: (2025)
by: Afiqah, Abdul Razak
Published: (2025)
Applications Of Statistical Techniques
In Quality Systems
by: Chee , Suat Kheng
Published: (2006)
by: Chee , Suat Kheng
Published: (2006)
Similar Items
-
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
by: Abu, Md Sahrom
Published: (2021) -
Statistical modelling and inference for a class of bivariate and related distributions / Ng Choung Min
by: Ng, Choung Min
Published: (2010) -
Unintentional Insider Threats Countermeasure Model (UITCM) in Reducing Internal Threat Environment
by: Zainab. A. A.Abdelsadeq
Published: (2024) -
Analysis performance of database programming for computation in statistical application
by: Abdul Rahid @ Abdul Rashid, Nurul Najwa
Published: (2015) -
Statistical methods for computer aided diagnosis in chest radiography / Hossein Ebrahimian
by: Ebrahimian, Hossein
Published: (2013)
