Current Issue

Download Full Article

PDF

Cite this paper as:


Iustin FLOROIU, "Leveraging Custom CNN and ResNet Architectures for Identifying Deviant Personality Traits in Cyber Threat Detection Using the Five Factor Model", Romanian Cyber Security Journal, ISSN 2668-6430, vol. 6(2), pp. 61-71, 2024. https://doi.org/10.54851/v6i2y202406

Romanian Cyber Security Journal / Fall 2024, No. 2, Vol. 6

Leveraging Custom CNN and ResNet Architectures for Identifying Deviant Personality Traits in Cyber Threat Detection Using the Five Factor Model

Iustin FLOROIU


Abstract

Understanding personality factors play a crucial role in the modelling of individuals’ behavioural patterns with regard to specific risk factors. A major problem in psychology related to this aspect revolves around using different computational algorithms and models to automatically verify the risk of cyber threats in both online and physical environments. The major attempt this paper is trying to make is detecting different disorderly behaviours that play a crucial role in risk management with regard to individuals, especially in the context of cyberterrorism. Custom convolutional and residual networks were implemented as the key solution to solving this contextual problem.

Keywords

Cybersecurity, Big5, Residual networks, Convolutional networks

Now you can buy our journal online

Order here