1. TensorFlow: A System for Large-Scale Machine Learning;Abadi Martín;OSDI,2016
2. Defining the insider threat
3. Dawn M Cappelli Andrew P Moore and Randall F Trzeciak. 2012. The CERT guide to insider threats: how to prevent detect and respond to information technology crimes (Theft Sabotage Fraud). Addis on-Wesley. Dawn M Cappelli Andrew P Moore and Randall F Trzeciak. 2012. The CERT guide to insider threats: how to prevent detect and respond to information technology crimes (Theft Sabotage Fraud). Addis on-Wesley.
4. Event Logs for the Analysis of Software Failures: A Rule-Based Approach