1. Insider-threat detection using Gaussian mixture models and sensitivity profiles;Al tabash;Comput. Secur.,2018
2. OpenFlow-enabled user traffic profiling in campus software defined networks;Bakhshi,2016
3. Autoencoders, unsupervised learning, and deep architectures;Baldi,2012
4. The insider attack problem nature and scope;Bellovin,2008
5. The insider problem revisited;Bishop,2005