{"id":"https://openalex.org/W4411204743","doi":"https://doi.org/10.1109/isdfs65363.2025.11012123","title":"Insider Threat Pattern Detection Using Deep Learning to Evaluate Cyber Value at Risk (CVaR)","display_name":"Insider Threat Pattern Detection Using Deep Learning to Evaluate Cyber Value at Risk (CVaR)","publication_year":2025,"publication_date":"2025-04-24","ids":{"openalex":"https://openalex.org/W4411204743","doi":"https://doi.org/10.1109/isdfs65363.2025.11012123"},"language":"en","primary_location":{"id":"doi:10.1109/isdfs65363.2025.11012123","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs65363.2025.11012123","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 13th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5095881816","display_name":"Prashant Vajpayee","orcid":"https://orcid.org/0009-0006-1285-6676"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Prashant Vajpayee","raw_affiliation_strings":["University of North Texas,Dept. of Informtation Science,Denton,Texas"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Dept. of Informtation Science,Denton,Texas","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5118122788","display_name":"Chittal Karuppiah","orcid":null},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chittal Karuppiah","raw_affiliation_strings":["University of North Texas,Dept. of Informtation Science,Denton,Texas"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Dept. of Informtation Science,Denton,Texas","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009360571","display_name":"Gahangir Hossain","orcid":"https://orcid.org/0000-0002-8205-4939"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gahangir Hossain","raw_affiliation_strings":["University of North Texas,Dept. of Informtation Science,Denton,Texas"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Dept. of Informtation Science,Denton,Texas","institution_ids":["https://openalex.org/I123534392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5095881816"],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":null,"apc_paid":null,"fwci":3.4958,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.92452576,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9648000001907349,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9648000001907349,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cvar","display_name":"CVAR","score":0.9617177248001099},{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.8386203646659851},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5936253666877747},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.5872248411178589},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.5096499919891357},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43628990650177},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39048832654953003},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.3190267086029053},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2503647208213806},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.21228429675102234},{"id":"https://openalex.org/keywords/expected-shortfall","display_name":"Expected shortfall","score":0.1837417483329773},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.11727738380432129},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.08021515607833862}],"concepts":[{"id":"https://openalex.org/C2779922397","wikidata":"https://www.wikidata.org/wiki/Q5014755","display_name":"CVAR","level":4,"score":0.9617177248001099},{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.8386203646659851},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5936253666877747},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.5872248411178589},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.5096499919891357},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43628990650177},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39048832654953003},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.3190267086029053},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2503647208213806},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.21228429675102234},{"id":"https://openalex.org/C5496284","wikidata":"https://www.wikidata.org/wiki/Q5420856","display_name":"Expected shortfall","level":3,"score":0.1837417483329773},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.11727738380432129},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.08021515607833862},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isdfs65363.2025.11012123","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs65363.2025.11012123","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 13th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2766781562","https://openalex.org/W4205304595","https://openalex.org/W2792608345","https://openalex.org/W2979782961","https://openalex.org/W308359497","https://openalex.org/W1499596878","https://openalex.org/W3136170567","https://openalex.org/W2947769183","https://openalex.org/W4387194049","https://openalex.org/W2018332730"],"abstract_inverted_index":{"In":[0,62],"an":[1,13,59,132],"era":[2],"marked":[3],"by":[4],"rapid":[5],"advancements":[6],"in":[7,254],"information":[8],"technology,":[9],"automation":[10],"has":[11,33],"become":[12],"integral":[14],"part":[15],"of":[16,26,65,100,154,164,189,220,241],"organizational":[17],"workflows.":[18],"However,":[19],"alongside":[20],"these":[21],"technological":[22],"strides,":[23],"the":[24,63,117,158,162,170,206,239],"challenge":[25],"data":[27,54,107,195],"leakage":[28],"due":[29,172],"to":[30,52,83,134,150,168,173,192,209],"insider":[31,67,128,155,174,223],"threats":[32,68,75],"intensified.":[34],"Authorized":[35],"users,":[36],"while":[37],"entrusted":[38],"with":[39],"privileges,":[40],"may":[41],"inadvertently":[42],"or":[43],"maliciously":[44],"compromise":[45],"sensitive":[46,106],"information.":[47],"Such":[48],"actions":[49,96],"can":[50],"lead":[51],"significant":[53],"loss":[55],"and":[56,86,109,182,200,215,226,237,247],"potentially":[57],"harm":[58],"organization's":[60],"reputation.":[61],"realm":[64],"cybersecurity,":[66],"emerge":[69],"as":[70],"a":[71,98,123],"formidable":[72],"adversary.":[73],"These":[74],"originate":[76],"from":[77],"individuals":[78],"who":[79],"hold":[80],"legitimate":[81],"access":[82,149],"computer":[84],"networks":[85],"systems":[87],"but":[88],"exploit":[89],"their":[90],"privileges":[91],"for":[92,126,145,196,233,251],"nefarious":[93],"purposes.":[94],"Their":[95],"span":[97],"spectrum":[99],"malevolence,":[101],"including":[102],"IP":[103],"theft,":[104],"sabotage,":[105],"exposure,":[108],"web":[110],"application":[111],"attacks.":[112],"This":[113],"paper":[114,244],"will":[115,160,203],"discuss":[116,161,205],"deep":[118,142,190,221],"learning":[119,143,191],"techniques,":[120],"which":[121],"offer":[122],"promising":[124],"avenue":[125],"addressing":[127],"threats.":[129,156],"It":[130],"provides":[131],"approach":[133],"analyze":[135],"user":[136,148],"behavior":[137],"pattern":[138],"using":[139],"rule":[140],"based":[141],"algorithms":[144],"identifying":[146],"abnormal":[147],"cyber":[151,227],"assets":[152,236],"indicative":[153],"Further,":[157],"study":[159,186],"concept":[163],"Cyber-":[165],"Value-at-Risk":[166],"(CVaR)":[167],"quantify":[169],"risk":[171,228],"threat":[175,224],"originated":[176],"via":[177],"various":[178],"users'":[179],"activities,":[180],"accesses,":[181],"anomalous":[183],"behaviors.":[184],"While":[185],"elaborates":[187],"utilization":[188],"leverage":[193],"synthetic":[194],"uncovering":[197],"hidden":[198],"patterns":[199],"anomalies,":[201],"it":[202],"also":[204],"challenges":[207],"related":[208],"dataset":[210],"availability,":[211],"privacy,":[212],"true":[213],"positives,":[214],"false":[216],"negatives.":[217],"The":[218,243],"fusion":[219],"learning,":[222],"detection,":[225],"management":[229],"holds":[230],"immense":[231],"potential":[232],"safeguarding":[234],"digital":[235],"maintaining":[238],"integrity":[240],"cyberspace.":[242],"explains":[245],"limitations":[246],"shares":[248],"future":[249],"directions":[250],"extended":[252],"research":[253],"this":[255],"context.":[256]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
