Current Issue
Download Full Article
Cite this paper as:
Iustin FLOROIU, "Leveraging Custom CNN and ResNet Architectures for Identifying Deviant Personality Traits in Cyber Threat Detection Using the Five Factor Model", Romanian Cyber Security Journal, ISSN 2668-6430, vol. 6(2), pp. 61-71, 2024. https://doi.org/10.54851/v6i2y202406
Romanian Cyber Security Journal / Fall 2024, No. 2, Vol. 6
Leveraging Custom CNN and ResNet Architectures for Identifying Deviant Personality Traits in Cyber Threat Detection Using the Five Factor Model
Abstract
Understanding personality factors play a crucial role in the modelling of individuals’ behavioural patterns with regard to specific risk factors. A major problem in psychology related to this aspect revolves around using different computational algorithms and models to automatically verify the risk of cyber threats in both online and physical environments. The major attempt this paper is trying to make is detecting different disorderly behaviours that play a crucial role in risk management with regard to individuals, especially in the context of cyberterrorism. Custom convolutional and residual networks were implemented as the key solution to solving this contextual problem.
Keywords
Cybersecurity, Big5, Residual networks, Convolutional networks