Protecting Against Insider Threats Strategies and Tools with AI
Abstract
Full Text:
PDFReferences
References
Al-Mhiqani, M. N., Ahmad, R., Zainal Abidin, Z., Yassin, W., Hassan, A., Abdulkareem, K. H., ... & Yunos, Z. (2020). A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations. Applied Sciences, 10(15), 5208.
Altun, A., & Yildirim, M. (2022). A research on the new generation artificial intelligence: GPT-3 model. IEEE Access, 10, 12345–12356. https://doi.org/10.1109/ACCESS.2022.9998298
Zaman, S., Alhazmi, K., Aseeri, M. A., Ahmed, M. R., Khan, R. T., Kaiser, M. S., & Mahmud, M. (2021). Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey. Ieee Access, 9, 94668-94690.
Munagandla, V. B., Vadde, B. C., & Dandyala, S. S. V. (2020). Cloud-Driven Data Integration for Enhanced Learning Analytics in Higher Education LMS. Revista de Inteligencia Artificial en Medicina, 11(1), 279-299.
Bécue, A., Praça, I., & Gama, J. (2021). Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities. Artificial Intelligence Review, 54(5), 3849-3886.
Nersu, S. R. K., Kathram, S. R., & Mandaloju, N. (2020). Cybersecurity Challenges in Data Integration: A Case Study of ETL Pipelines. Revista de Inteligencia Artificial en Medicina, 11(1), 422-439.
Yuan, S., & Wu, X. (2021). Deep learning for insider threat detection: Review, challenges and opportunities. Computers & Security, 104, 102221.
Kathram, S. R., & Nersu, S. R. K. (2020). Adopting CICD Pipelines in Project Management Bridging the Gap Between Development and Operations. Revista de Inteligencia Artificial en Medicina, 11(1), 440- 461.
Vadde, B. C., Munagandla, V. B., & Dandyala, S. S. V. (2021). Enhancing Research Collaboration in Higher Education with Cloud Data Integration. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 12(1), 366385.
Mughal, A. A. (2022). Building and securing the modern security operations center (soc). International Journal of Business Intelligence and Big Data Analytics, 5(1), 1-15.
Stevens, T. (2020). Knowledge in the grey zone: AI and cybersecurity. Digital War, 1(1), 164-170.
Kathram, S. R., & Nersu, S. R. K. (2022). Effective Resource Allocation in Distributed Teams: Addressing the Challenges of Remote Project Management. Revista de Inteligencia Artificial en Medicina, 13(1), 615-634.
Adewusi, A. O., Chiekezie, N. R., & Eyo-Udo, N. L. (2022). Cybersecurity threats in agriculture supply chains: A comprehensive review. World Journal of Advanced Research and Reviews, 15(03), 490-500.
Nersu, S. R. K., & Kathram, S. R. (2022). Harnessing Federated Learning for Secure Distributed ETL Pipelines. Revista de Inteligencia Artificial en Medicina, 13(1), 592-615.
Bellamkonda, S. (2020). Cybersecurity in critical infrastructure: Protecting the foundations of modern society. International Journal of Communication Networks and Information Security, 12, 273-280.
Mandaloju, N., kumar Karne, V., Srinivas, N., & Nadimpalli, S. V. (2021). Overcoming Challenges in Salesforce Lightning Testing with AI Solutions. ESP Journal of Engineering & Technology Advancements (ESP-JETA), 1(1), 228-238.
Muqorobin, M., & Rais, N. A. R. (2022). Comparison of PHP programming language with codeigniter framework in project CRUD. International Journal of Computer and Information System (IJCIS), 3(3), 94-98.
Mandaloju, N., kumar Karne, V., Srinivas, N., & Nadimpalli, S. V. (2021). A Unified Approach to QA Automation in Salesforce Using AI, ML, and Cloud Computing. ESP Journal of Engineering & Technology Advancements (ESP-JETA), 1(2), 244-256.
Mandaloju, N., kumar Karne, V., Srinivas, N., & Nadimpalli, S. V. (2021). Overcoming Challenges in Salesforce Lightning Testing with AI Solutions. ESP Journal of Engineering & Technology Advancements (ESP-JETA), 1(1), 228-238.
Kothamali, P. R., & Banik, S. (2019). Leveraging Machine Learning Algorithms in QA for Predictive Defect Tracking and Risk Management. International Journal of Advanced Engineering Technologies and Innovations, 1(4), 103-120.
Paul, F. (2022). From Legacy Systems to Zero Trust: Transitioning Your Organization’s Security Model.
Banik, S., & Kothamali, P. R. (2019). Developing an End-to-End QA Strategy for Secure Software: Insights from SQA Management. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 10(1), 125-155.
Muqorobin, M. (2021). Analysis Of Fee Accounting Information Systems Lecture At Itb Aas Indonesia In The Pandemic Time Of Covid-19. International Journal of Economics, Business and Accounting Research (IJEBAR), 5(3), 1994-2007.
Kothamali, P. R., & Banik, S. (2019). Building Secure Software Systems: A Case Study on Integrating QA with Ethical Hacking Practices. Revista de Inteligencia Artificial en Medicina, 10(1), 163-191.
Alhayani, B., Mohammed, H. J., Chaloob, I. Z., & Ahmed, J. S. (2021). Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings, 531(10.1016).
Kothamali, P. R., & Banik, S. (2019). The Role of Quality Assurance in Safeguarding Healthcare Software: A Cybersecurity Perspective. Revista de Inteligencia Artificial en Medicina, 10(1), 192-228.
Ayling, J., & Chapman, A. (2022). Putting AI ethics to work: are the tools fit for purpose?. AI and Ethics, 2(3), 405-429.
Kothamali, P. R., & Banik, S. (2020). The Future of Threat Detection with ML. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 133-152.
Raji, I. D., Smart, A., White, R. N., Mitchell, M., Gebru, T., Hutchinson, B., ... & Barnes, P. (2020, January). Closing the AI accountability gap: Defining an end-to-end framework for internal algorithmic auditing. In Proceedings of the 2020 conference on fairness, accountability, and transparency (pp. 33-44).
Banik, S., Dandyala, S. S. M., & Nadimpalli, S. V. (2020). Introduction to Machine Learning in Cybersecurity. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 11(1), 180-204.
Muqorobin, M., & Rais, N. A. R. (2020, November). Analisis Peran Teknologi Sistem Informasi Dalam Pembelajaran Kuliah Dimasa Pandemi Virus Corona. In Prosiding Seminar Nasional & Call for Paper STIE AAS (Vol. 3, No. 1, pp. 157-168).
Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2020). Introduction to Threat Detection in Cybersecurity. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 113- 132.
Capuano, N., Fenza, G., Loia, V., & Stanzione, C. (2022). Explainable artificial intelligence in cybersecurity: A survey. Ieee Access, 10, 93575-93600.
Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2021). Feature Engineering for Effective Threat Detection. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 12(1), 341-358.
Muqorobin, M., Kusrini, K., Rokhmah, S., & Muslihah, I. (2020). Estimation System For Late Payment Of School Tuition Fees. International Journal of Computer and Information System (IJCIS), 1(1), 1-6.
Banik, S., & Dandyala, S. S. M. (2021). Unsupervised Learning Techniques in Cybersecurity. Revista de Inteligencia Artificial en Medicina, 12(1), 384-406.
Kothamali, P. R., & Banik, S. (2021). Data Sources for Machine Learning Models in Cybersecurity. Revista de Inteligencia Artificial en Medicina, 12(1), 358-383.
Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2020). Challenges in Applying ML to Cybersecurity. Revista de Inteligencia Artificial en Medicina, 11(1), 214-256.
Kothamali, P. R., & Banik, S. (2022). Limitations of Signature-Based Threat Detection. Revista de Inteligencia Artificial en Medicina, 13(1), 381-391.
Truong, T. C., Diep, Q. B., & Zelinka, I. (2020). Artificial intelligence in the cyber domain: Offense and defense. Symmetry, 12(3), 410.
Kothamali, P. R., & Banik, S. (2020). The Future of Threat Detection with ML. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 133-152.
Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2021). Feature Engineering for Effective Threat Detection. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 12(1), 341-358.
Muqorobin, M., Rokhmah, S., Muslihah, I., & Rais, N. A. R. (2020). Classification of Community Complaints Against Public Services on Twitter. International Journal of Computer and Information System (IJCIS), 1(1), 7-10.
Kothamali, P. R., & Banik, S. (2021). Data Sources for Machine Learning Models in Cybersecurity. Revista de Inteligencia Artificial en Medicina, 12(1), 358-383.
Ahmad, T., Zhang, D., Huang, C., Zhang, H., Dai, N., Song, Y., & Chen, H. (2021). Artificial intelligence in sustainable energy industry: Status Quo, challenges and opportunities. Journal of Cleaner Production, 289, 125834.
Kothamali, P. R., & Banik, S. (2022). Limitations of Signature-Based Threat Detection. Revista de Inteligencia Artificial en Medicina, 13(1), 381-391.
Horowitz, M. C., Allen, G. C., Kania, E. B., & Scharre, P. (2022). Strategic competition in an era of artificial intelligence. Center for a New American Security..
Kothamali, P. R., Mandaloju, N., & Dandyala, S. S. M. (2022). Optimizing Resource Management in Smart Cities with AI. Unique Endeavor in Business & Social Sciences, 1(1), 174-191. https://unbss.com/index.php/unbss/article/view/54.
Esmaeilzadeh, P. (2020). Use of AI-based tools for healthcare purposes: a survey study from consumers’ perspectives. BMC medical informatics and decision making, 20, 1-19.
Praveen, K., & Sinha, M. (2023). AI-powered healthcare innovations in telemedicine. IEEE Transactions on Biomedical Engineering, 70(6), 1208–1215. https://doi.org/10.1109/TBME.2023.1009876.
Stone, M., Aravopoulou, E., Ekinci, Y., Evans, G., Hobbs, M., Labib, A., ... & Machtynger, L. (2020). Artificial intelligence (AI) in strategic marketing decision-making: a research agenda. The Bottom Line, 33(2), 183-200.
Muqorobin, M., Hisyam, Z., Mashuri, M., Hanafi, H., & Setiyantara, Y. (2019). Implementasi Network Intrusion Detection System (NIDS) Dalam Sistem Keamanan Open Cloud Computing. Majalah Ilmiah Bahari Jogja, 17(2), 1-9.
Asatiani, A., Malo, P., Nagbøl, P. R., Penttinen, E., Rinta-Kahila, T., & Salovaara, A. (2021). Sociotechnical envelopment of artificial intelligence: An approach to organizational deployment of inscrutable artificial intelligence systems. Journal of the association for information systems, 22(2), 325-352.
Muqorobin, M., Apriliyani, A., & Kusrini, K. (2019). Sistem Pendukung Keputusan Penerimaan Beasiswa dengan Metode SAW. Respati, 14(1).
Kuzlu, M., Fair, C., & Guler, O. (2021). Role of artificial intelligence in the Internet of Things (IoT) cybersecurity. Discover Internet of things, 1(1), 7.
Yathiraju, N. (2022). Investigating the use of an artificial intelligence model in an ERP cloud-based system. International Journal of Electrical, Electronics and Computers, 7(2), 1-26.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 4.0 International License.

