no code implementations • 6 Mar 2022 • R G Gayathri, Atul Sajjanhar, Yong Xiang
Cyberattacks from within an organization's trusted entities are known as insider threats.
no code implementations • 15 Feb 2021 • R G Gayathri, Atul Sajjanhar, Yong Xiang, Xingjun Ma
Insider threats are the cyber attacks from within the trusted entities of an organization.
no code implementations • 13 Nov 2019 • Gayathri R G, Atul Sajjanhar, Yong Xiang
The insider threat analysis is mainly done using the frequency based attributes extracted from the raw data available from data sources.
1 code implementation • 22 Oct 2018 • Siddhardha Balemarthy, Atul Sajjanhar, James Xi Zheng
Extracting various syllables is the process we are focusing on which is known as audio recognition in terms of Machine Learning