Author:
Xiao Haitao,Zhang Chen,Liu Song,Jiang Bo,Lu Zhigang,Wang Fei,Liu Yuling
Publisher
Springer Nature Switzerland
Reference15 articles.
1. 2020 Securonix Insider Threat Report. https://www.securonix.com/resources/2020-insider-threat-report/. (Accessed 29 Dec 2021)
2. 2021 Insider threat report. https://gurucul.com/2021-insider-threat-report. (Accessed 29 Dec 2021)
3. Le, D.C., Zincir-Heywood, A.N.: Evaluating insider threat detection workflow using supervised and unsupervised learning. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 270–275. IEEE (2018)
4. Jiang, J., et al.: Anomaly detection with graph convolutional networks for insider threat and fraud detection. In: MILCOM 2019–2019 IEEE Military Communications Conference (MILCOM), pp. 109–114. IEEE (2019)
5. Gayathri, R., Sajjanhar, A., Xiang, Y.: Image-based feature representation for insider threat classification. Appl. Sci. 10(14), 4945 (2020)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献