{"id":"https://openalex.org/W4386066497","doi":"https://doi.org/10.1109/smartnets58706.2023.10215718","title":"A Machine Learning Framework &amp; Development for Insider Cyber-crime Threats Detection","display_name":"A Machine Learning Framework &amp; Development for Insider Cyber-crime Threats Detection","publication_year":2023,"publication_date":"2023-07-25","ids":{"openalex":"https://openalex.org/W4386066497","doi":"https://doi.org/10.1109/smartnets58706.2023.10215718"},"language":"en","primary_location":{"id":"doi:10.1109/smartnets58706.2023.10215718","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartnets58706.2023.10215718","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026020157","display_name":"Rasheed Yousef","orcid":null},"institutions":[{"id":"https://openalex.org/I2799716270","display_name":"Palestine Technical University - Kadoorie","ror":"https://ror.org/00cfa1c07","country_code":"PS","type":"education","lineage":["https://openalex.org/I2799716270"]}],"countries":["PS"],"is_corresponding":true,"raw_author_name":"Rasheed Yousef","raw_affiliation_strings":["Palestine Technical University - Kadoorie Tulkarem,College of IT,Dept. of Computer Science","Dept. of Computer Science, College of IT, Palestine Technical University - Kadoorie Tulkarem"],"affiliations":[{"raw_affiliation_string":"Palestine Technical University - Kadoorie Tulkarem,College of IT,Dept. of Computer Science","institution_ids":["https://openalex.org/I2799716270"]},{"raw_affiliation_string":"Dept. of Computer Science, College of IT, Palestine Technical University - Kadoorie Tulkarem","institution_ids":["https://openalex.org/I2799716270"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112656929","display_name":"Mahmmoud Jazzar","orcid":null},"institutions":[{"id":"https://openalex.org/I2799716270","display_name":"Palestine Technical University - Kadoorie","ror":"https://ror.org/00cfa1c07","country_code":"PS","type":"education","lineage":["https://openalex.org/I2799716270"]}],"countries":["PS"],"is_corresponding":false,"raw_author_name":"Mahmmoud Jazzar","raw_affiliation_strings":["Palestine Technical University - Kadoorie Tulkarem,College of IT,Dept. of Computer Science","Dept. of Computer Science, College of IT, Palestine Technical University - Kadoorie Tulkarem"],"affiliations":[{"raw_affiliation_string":"Palestine Technical University - Kadoorie Tulkarem,College of IT,Dept. of Computer Science","institution_ids":["https://openalex.org/I2799716270"]},{"raw_affiliation_string":"Dept. of Computer Science, College of IT, Palestine Technical University - Kadoorie Tulkarem","institution_ids":["https://openalex.org/I2799716270"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040655055","display_name":"Amna Eleyan","orcid":"https://orcid.org/0000-0002-2025-3027"},"institutions":[{"id":"https://openalex.org/I11983389","display_name":"Manchester Metropolitan University","ror":"https://ror.org/02hstj355","country_code":"GB","type":"education","lineage":["https://openalex.org/I11983389"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Amna Eleyan","raw_affiliation_strings":["Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,UK","Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, UK"],"affiliations":[{"raw_affiliation_string":"Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,UK","institution_ids":["https://openalex.org/I11983389"]},{"raw_affiliation_string":"Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, UK","institution_ids":["https://openalex.org/I11983389"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079374330","display_name":"Tarek Bejaoui","orcid":"https://orcid.org/0000-0003-2501-8939"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Tarek Bejaoui","raw_affiliation_strings":["University of Carthage,Computer Engineering Department,Tunisia","Computer Engineering Department, University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage,Computer Engineering Department,Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Computer Engineering Department, University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5026020157"],"corresponding_institution_ids":["https://openalex.org/I2799716270"],"apc_list":null,"apc_paid":null,"fwci":3.5441,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.93256693,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.9306385517120361},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.8750191926956177},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7481221556663513},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6384417414665222},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6025392413139343},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5687220096588135},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.507684588432312},{"id":"https://openalex.org/keywords/unsupervised-learning","display_name":"Unsupervised learning","score":0.4789224863052368}],"concepts":[{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.9306385517120361},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.8750191926956177},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7481221556663513},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6384417414665222},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6025392413139343},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5687220096588135},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.507684588432312},{"id":"https://openalex.org/C8038995","wikidata":"https://www.wikidata.org/wiki/Q1152135","display_name":"Unsupervised learning","level":2,"score":0.4789224863052368},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartnets58706.2023.10215718","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartnets58706.2023.10215718","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1458873377","https://openalex.org/W1973704753","https://openalex.org/W1988054515","https://openalex.org/W2060450695","https://openalex.org/W2070648774","https://openalex.org/W2126264383","https://openalex.org/W2316771551","https://openalex.org/W2553160602","https://openalex.org/W2582257950","https://openalex.org/W2949885549","https://openalex.org/W3127924007","https://openalex.org/W3159552247","https://openalex.org/W3191227458","https://openalex.org/W3202733154","https://openalex.org/W3217364290","https://openalex.org/W4256210417","https://openalex.org/W4313492216","https://openalex.org/W6795105167","https://openalex.org/W6922310531"],"related_works":["https://openalex.org/W2766781562","https://openalex.org/W4205304595","https://openalex.org/W2979782961","https://openalex.org/W308359497","https://openalex.org/W1499596878","https://openalex.org/W3136170567","https://openalex.org/W2947769183","https://openalex.org/W2018332730","https://openalex.org/W4387194049","https://openalex.org/W2286217954"],"abstract_inverted_index":{"Many":[0],"organizations":[1],"face":[2],"a":[3,140],"significant":[4],"challenge":[5],"with":[6,107],"insider":[7,55,91,119,145,194,205],"threats.":[8,27,195],"As":[9],"conventional":[10],"security":[11],"measures":[12],"like":[13],"intrusion":[14],"detection":[15],"systems":[16],"and":[17,24,39,67,101,112,125,176,178,186,208,211,220],"firewalls":[18],"aren't":[19],"always":[20],"effective":[21],"in":[22,116],"detecting":[23,117,144],"preventing":[25],"such":[26,63,170],"Insider":[28],"threats":[29],"often":[30],"come":[31],"from":[32,84,217],"trusted":[33],"individuals":[34],"who":[35],"possess":[36],"knowledge":[37],"of":[38,50,75],"access":[40],"to":[41,53,88,98,103,166],"important":[42],"organizational":[43,187],"assets.":[44],"This":[45],"work":[46],"explores":[47],"the":[48,73,122,129,159],"use":[49,209],"machine":[51,78,109,136,214],"learning":[52,79,110,137,215],"classify":[54],"threat":[56,155,206],"behaviors,":[57],"specifically":[58],"focusing":[59],"on":[60,200],"three":[61],"approaches":[62,216],"that":[64,81,134],"supervised,":[65],"unsupervised,":[66],"reinforcement":[68],"learning.":[69],"The":[70,93],"paper":[71],"describes":[72],"development":[74],"an":[76],"unsupervised":[77],"system":[80],"analyzes":[82],"data":[83],"multiple":[85],"technical":[86,219],"sources":[87],"detect":[89],"malicious":[90,118],"activity.":[92],"system,":[94],"which":[95],"is":[96,164],"designed":[97],"be":[99,139,150,190],"simple":[100],"easy":[102],"assemble,":[104],"was":[105],"tested":[106],"existing":[108],"algorithms":[111],"showed":[113],"moderate":[114],"success":[115,127],"activity":[120],"during":[121,128],"training":[123],"phase":[124],"negligible":[126],"testing":[130,212],"phase.These":[131],"results":[132],"suggest":[133],"while":[135],"can":[138],"useful":[141],"tool":[142],"for":[143,154],"threats,":[146],"it":[147,163],"should":[148,198],"not":[149],"solely":[151],"relied":[152],"upon":[153],"detection.":[156],"To":[157],"improve":[158],"current":[160],"system's":[161],"performance,":[162],"necessary":[165],"include":[167],"additional":[168],"features,":[169],"as":[171],"file":[172],"names,":[173],"email":[174],"subjects":[175],"headers,":[177],"website":[179],"types.":[180],"Furthermore,":[181],"physical":[182],"security,":[183],"cybersecurity,":[184],"psychological,":[185],"factors":[188],"must":[189],"considered":[191],"when":[192],"addressing":[193],"Future":[196],"research":[197],"focus":[199],"acquiring":[201],"real":[202],"datasets,":[203],"collecting":[204],"scenarios":[207],"cases,":[210],"different":[213],"both":[218],"non-technical":[221],"sources.":[222]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":8}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2025-10-10T00:00:00"}
