Journal articles on the topic 'UEBA'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'UEBA.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Савенков, П. А., and П. С. Трегубов. "Using the methods and algorithms for data analysis and machine learning in UEBA / DSS to support management decision-making." МОДЕЛИРОВАНИЕ, ОПТИМИЗАЦИЯ И ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ 8, no. 1(28) (2020): 39–40. http://dx.doi.org/10.26102/2310-6018/2020.28.1.039.
Full textDesetty, Avinash Gupta. "Unveiling Hidden Threats with ML-Powered User and Entity Behavior Analytics (UEBA)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 15, no. 1 (2024): 44–50. http://dx.doi.org/10.61841/turcomat.v15i1.14394.
Full textPaul, Akampurira, Bashir Olaniyi Olaniyi Sadiq, Dahiru Buhari, Maninti Venkateswarlu, Atuhe Aarone, and Mugisha Brian. "A Review of Neural Networks for Enhanced User Entity Behavior Analytics in Cybersecurity: Addressing the Challenge of Vanishing Gradient." International Journal of Research and Innovation in Applied Science IX, no. XII (2024): 154–72. https://doi.org/10.51584/ijrias.2024.912016.
Full textIndranil Iyer, Kumrashan. "Unmasking the Shadows: Recognizing and Overcoming Hidden Pitfalls in UEBA." International Journal of Science and Research (IJSR) 12, no. 4 (2023): 1988–93. https://doi.org/10.21275/sr230413090718.
Full textIndranil Iyer, Kumrashan. "Behavioral Intelligence at Scale: Implementing UEBA for Enhanced Security Posture." International Journal of Science and Research (IJSR) 11, no. 7 (2022): 1971–77. https://doi.org/10.21275/sr22074090532.
Full textMakarenko, O., та A. Yanko. "КОНЦЕПЦІЯ СИСТЕМИ ВИЯВЛЕННЯ ТА ЗАПОБІГАННЯ ВТОРГНЕНЬ ДО МЕРЕЖІ". Системи управління, навігації та зв’язку. Збірник наукових праць 2, № 68 (2022): 59–67. http://dx.doi.org/10.26906/sunz.2022.2.059.
Full textDhaygude, Pratik, Nilesh Dhulshette, Omkar Ganjale, Umesh ,. Sawant, and Prof Pranali Navghare. "A Review Paper on Different Deep Learning Methodologies for User and Entity Behavior Analytics(UEBA)." International Journal of Research Publication and Reviews 4, no. 5 (2023): 3757–62. http://dx.doi.org/10.55248/gengpi.4.523.42121.
Full textYang, Beijia. "Deep Learning-Based Information Security." Applied and Computational Engineering 97, no. 1 (2024): 145–51. http://dx.doi.org/10.54254/2755-2721/97/20241358.
Full textMuzhanova, Tetyana, Svitlana Lehominova, Yuriy Yakymenko, and Iryna Mordas. "TECHNOLOGIES OF USER ACTIVITIES MONITORING AND ANALYSIS IN PREVENTING INSIDER THREATS OF INFORMATION SECURITY OF AN ORGANIZATION." Cybersecurity: Education, Science, Technique 1, no. 13 (2021): 50–62. http://dx.doi.org/10.28925/2663-4023.2021.13.5062.
Full textChandrashekar Reddy Aare. "Data Risk intelligence architecture: Real-time threat detection across billions of financial transactions." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 919–26. https://doi.org/10.30574/wjaets.2025.15.3.0983.
Full textRahul Chowdary Bondalapati, Lakshmi Apoorwa Kumpatla, and Suvarna Rekha Karumanchi. "Advancing cloud platform engineering: Innovations in secure deployment automation, CI/CD, and Risk Mitigation for 2025." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 0149–56. https://doi.org/10.30574/wjaets.2025.15.3.0911.
Full textAkintayo, Micheal Ajayi, Okandeji Omokanye Abraham, Olowu Olawale, Olowofela Adeleye Ademilola, Mary Omole Olayinka, and Uchechukwu Wada Ifeoluwa. "Detecting insider threats in banking using AI-driven anomaly detection with a data science approach to cybersecurity." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 123–32. https://doi.org/10.5281/zenodo.15081524.
Full textMartí, M. R., D. Medina, G. J. Español, M. Pérez, and J. R. Betancourt. "Estudio anatómico de la vascularización peroneal y su importancia clínica para el injerto vascularizado de peroné." Revista Iberoamericana de Cirugía de la Mano 44, no. 02 (2016): 078–85. http://dx.doi.org/10.1016/j.ricma.2016.07.001.
Full textMarques Ribas, Marcelo, Ulisses Penteado, André Grégio, and Paulo Lisboa de Almeida. "Agrupamento de usuários e organizações para verificação de viabilidade de distinção comportamental de uso de sistemas com base em aplicações e tempo." Anais do Computer on the Beach 16 (May 27, 2025): 105–12. https://doi.org/10.14210/cotb.v16.p105-112.
Full textGantela Prabhakar Simhadri Mallikarjuna Rao. "Integrated Framework for Data Security in Cloud Computing Using Deep Learning Techniques." Communications on Applied Nonlinear Analysis 32, no. 8s (2025): 798–810. https://doi.org/10.52783/cana.v32.3817.
Full textBlancaflor, Eric, Keith Christian Esteron, Andrade Cy, Wayne Hans Camacho, and Bradney Guzon. "Mitigating Cyber Attacks for Organization Assets using UEBA (User and Entity Behavior Analytics) and other Machine Learning Solutions from Cloud Security Threats: A Literature Review." Network Security 2024, no. 9 (2025): 25–31. https://doi.org/10.70985/tkz8bz14.
Full textMusto, Benjamin, and Jamie Vicary. "Quantum Latin squares and unitary error bases." Quantum Information and Computation 16, no. 15&16 (2016): 1318–32. http://dx.doi.org/10.26421/qic16.15-16-4.
Full textNagar, Gourav. "Leveraging Artificial Intelligence to Automate and Enhance Security Operations: Balancing Efficiency and Human Oversight." International Journal of Scientific Research and Management (IJSRM) 6, no. 07 (2018): 78–94. http://dx.doi.org/10.18535/ijsrm/v6i7.ec05.
Full textAbbas A. Mahdi. "Machine learning applications of network security enhancement: review." Computer Science & IT Research Journal 5, no. 10 (2024): 2283–300. http://dx.doi.org/10.51594/csitrj.v5i10.1635.
Full textNikum, Avishkar. "Examining the Human Factors in Cybersecurity Practices: Psychological, Technical, and Organisational Perspectives." Asian Journal of Research in Computer Science 18, no. 6 (2025): 292–300. https://doi.org/10.9734/ajrcos/2025/v18i6699.
Full textDr., Suman Thapaliya, and Ravi Chandra Gurung Mr. "Mitigating Insider Threats and Data Breaches: Enhancing Data Loss Prevention Systems with Behavioral Analytics And NLP." International Journal of Multidisciplinary and Innovative Research 02, no. 01 (2025): 22–27. https://doi.org/10.5281/zenodo.14634504.
Full textSteingartner, William, Darko Galinec, and Andrija Kozina. "Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model." Symmetry 13, no. 4 (2021): 597. http://dx.doi.org/10.3390/sym13040597.
Full textCamara, Amadou Sara. "The Role of Cognitive-Information Technologies in Cybersecurity: Threat Detection and Adaptive Defense Systems." Вопросы безопасности, no. 1 (January 2024): 61–70. http://dx.doi.org/10.25136/2409-7543.2024.1.69882.
Full textZuanon, Angela Cristina Cilense, José Arnaldo Frutuoso Roveda, Maria Candida Soares Del-Masso, and Eduardo Galhardo. "A Extensão Universitária abraça o Brasil." Revista Ciência em Extensão 13, no. 1 (2025): 2–8. https://doi.org/10.23901/1679-4605.2017v13n1p2-8.
Full textCargnelutti Filho, Alberto, Lindolfo Storck, Alessandro Dal'Col Lúcio, Marcos Toebe, and Bruna Mendonça Alves. "Tamanho de unidades experimentais básicas e tamanho ótimo de parcelas para nabo-forrageiro." Pesquisa Agropecuária Brasileira 51, no. 4 (2016): 309–19. http://dx.doi.org/10.1590/s0100-204x2016000400003.
Full textMota Loor, Andrés Alejandro, Mercedes Ermelinda Palacios Aguirre, Mario Adrián Ávalos Layana, and Vicky Edita Narea Morales. "Infecciones urinarias asociadas a pacientes con VIH-sida." Pro Sciences: Revista de Producción, Ciencias e Investigación 6, no. 43 (2022): 176–82. http://dx.doi.org/10.29018/issn.2588-1000vol6iss43.2022pp176-182.
Full textShelke, Palvi, and Timo Hamalainen. "Analysing Multidimensional Strategies for Cyber Threat Detection in Security Monitoring." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 780–87. http://dx.doi.org/10.34190/eccws.23.1.2123.
Full textLytvynov, V. A., I. M. Oksanych, and S. V. Hrybkov. "Regarding the possibilities of implementing the joint functioning of LMS and SIEM manage-ment based on free open-source tools." Mathematical machines and systems 1 (2025): 55–63. https://doi.org/10.34121/1028-9763-2025-1-55-63.
Full textMilhomem, Karina de Oliveira, Maria Olívia de Albuquerque Ribeiro Simão, and Ivan Nunes de Souza. "UI GreenMetric: avanços na institucionalização de Universidades Sustentáveis na Amazônia." DELOS: Desarrollo Local Sostenible 17, no. 54 (2024): e1408. http://dx.doi.org/10.55905/rdelosv17.n54-023.
Full textDos Santos Gonçalves, Jennifer Victória, Érica Cardoso Martins, Sabrina Maciel da Costa, et al. "IMUNIZA UEMA." REVISTA PRÁTICAS EM EXTENSÃO 9, no. 1 (2025): 10–16. https://doi.org/10.18817/rpe.v9i1.3843.
Full textKelly, Seamus, and Niall O’Regan. "The Union of European Football Associations 2020 Coaching Convention Update and Coach Education in the Football Association of Ireland." International Sport Coaching Journal 8, no. 3 (2021): 382–93. http://dx.doi.org/10.1123/iscj.2020-0090.
Full textIŞIKDEMİR, Erhan, Mücahit IŞIK, Osman DAĞ, and Özlem KÖKLÜ. "Analysis of the Relative Age Effect According to Player Positions in the UEFA Champions League and UEFA Europa League: A Descriptive Study." Turkiye Klinikleri Journal of Sports Sciences 17, no. 1 (2025): 28–34. https://doi.org/10.5336/sportsci.2024-105277.
Full textDos Santos, Francisco Éder Santos, Sérgio Rogério Azevedo Junqueira, Raqueline Brito Da Cruz, et al. "EDUCAÇÃO NÃO FORMAL: EXPOSIÇÃO “SIMBOLOS SAGRADOS DAS RELIGIÕES: CONHECER PARA RESPEITAR E CONVIVER EM PAZ”." ARACÊ 6, no. 4 (2024): 14790–812. https://doi.org/10.56238/arev6n4-221.
Full textGarcía, Borja. "UEFA and the European Union: From Confrontation to Co-operation?" Journal of Contemporary European Research 3, no. 3 (2007): 202–23. http://dx.doi.org/10.30950/jcer.v3i3.52.
Full textSakalis, Vasileios I., Vasileios Sfiggas, Ioannis Vouros, Georgios Salpiggidis, Athanasios Papathanasiou, and Apostolos Apostolidis. "Subtle errors of bladder wall thickness measurement have a significant impact on the calculation of ultrasound-estimated bladder weight. A pilot study." Medical Ultrasonography 20, no. 3 (2018): 292. http://dx.doi.org/10.11152/mu-1369.
Full textJérôme, David. "L'esthétique de Fumito Ueda." Nouvelle revue d’esthétique 11, no. 1 (2013): 63. http://dx.doi.org/10.3917/nre.011.0063.
Full textUeda, Masahito, and Anthony J. Leggett. "Ueda and Leggett Reply:." Physical Review Letters 81, no. 6 (1998): 1343. http://dx.doi.org/10.1103/physrevlett.81.1343.
Full textUeda, Masahito, and Tsuneya Ando. "Ueda and Ando Reply." Physical Review Letters 73, no. 20 (1994): 2785. http://dx.doi.org/10.1103/physrevlett.73.2785.
Full textPratama Putra, Adhitya, and Debbie Affianty Lubis. "Upaya Union European Football Dalam Menangani Isu Rasisme Dalam Sepak Bola Di Kawasan Eropa (2020-2022)." HUMANUS : Jurnal Sosiohumaniora Nusantara 1, no. 2 (2024): 299–312. http://dx.doi.org/10.62180/sf9h8a16.
Full textCoisy, Annie, and Laetitia Jenn. "Signé : UEB." Documents numériques, no. 53 (January 1, 2009): 15. http://dx.doi.org/10.35562/arabesques.2162.
Full textDr., A.SHAJI GEORGE, GEORGE A.S.HOVAN, T.BASKAR, and Pandey Digvijay. "XDR: The Evolution of Endpoint Security Solutions -Superior Extensibility and Analytics to Satisfy the Organizational Needs of the Future." International Journal of Advanced Research in Science, Communication and Technology (IJARSCT) 8, no. 1 (2021): 493–501. https://doi.org/10.5281/zenodo.7028219.
Full textSendy, Sendy, Gatot Soepriyanto, and Nuraini Sari. "Analysis of The Implementation of UEFA Financial Fair Play: A Case Study on Arsenal and Machester United Football Club." Binus Business Review 5, no. 1 (2014): 123. http://dx.doi.org/10.21512/bbr.v5i1.1202.
Full textŞaşmaz Ataçocuğu, Muazzez, and Mert Kerem Zelyurt. "An evaluation on the regulations relating the working lives of the football trainers in Turkey considering the economic consequencesEkonomik sonuçları açısından Türkiye’de futbol antrenörlerinin çalışma hayatına ilişkin düzenlemelerin değerlendirilmesi." Journal of Human Sciences 13, no. 3 (2016): 5915. http://dx.doi.org/10.14687/jhs.v13i3.4335.
Full textChhaya, V. M., J. J. Tarwadi, and Smita Chhag. "Elastic Scattering of Electrons by Helium Atoms at Intermediate Energies." Zeitschrift für Naturforschung A 48, no. 3 (1993): 465–68. http://dx.doi.org/10.1515/zna-1993-0304.
Full textSchubert, Mathias. "Potential agency problems in European club football? The case of UEFA Financial Fair Play." Sport, Business and Management: An International Journal 4, no. 4 (2014): 336–50. http://dx.doi.org/10.1108/sbm-02-2014-0006.
Full textHong, Sunggye, L. Penny Rosenblum, and Amy Frank Campbell. "Implementation of Unified English Braille by Teachers of Students with Visual Impairments in the United States." Journal of Visual Impairment & Blindness 111, no. 6 (2017): 543–56. http://dx.doi.org/10.1177/0145482x1711100605.
Full textMartínez Martínez, Francisco Daniel, and Higinio González García. "Efecto de marcar primero en la final de la UEFA Champions League y la UEFA Europa League (Effect of scoring first in finals of UEFA Champions League and UEFA Europe League)." Retos, no. 37 (July 26, 2019): 134–38. http://dx.doi.org/10.47197/retos.v37i37.67933.
Full textStephens, Richard, Grant Bosworth, and Thomas Shepherd. "Playing in the UEFA Europa League Does Not Adversely Affect English Premier League or La Liga Performance." Journal of Functional Morphology and Kinesiology 4, no. 1 (2018): 2. http://dx.doi.org/10.3390/jfmk4010002.
Full textDagaev, Dmitry, and Vladimir Yu Rudyak. "Seeding the UEFA Champions League participants: evaluation of the reforms." Journal of Quantitative Analysis in Sports 15, no. 2 (2019): 129–40. http://dx.doi.org/10.1515/jqas-2017-0130.
Full textOliveira, Carlos Henrique Rodrigues de, Luiz Ricardo Souza Ripardo, and Richardson da Silva Sousa Lima. "Quadruple Play Communication with System Integration in VoIP University." Revista de Gestão e Secretariado 16, no. 5 (2025): e4918. https://doi.org/10.7769/gesec.v16i5.4918.
Full text