Probabilistic Graphical Model on Detecting Insiders: Modeling with SGD-HMM
暂无分享,去创建一个
[1] Mudita Singhal,et al. Detecting Insider Threat from Enterprise Social and Online Activity Data , 2015, MIST@CCS.
[2] Jeff A. Bilmes,et al. A gentle tutorial of the em algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models , 1998 .
[3] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[4] Jason R. C. Nurse,et al. A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models , 2016, MIST@CCS.
[5] Klaus-Robert Müller,et al. Efficient BackProp , 2012, Neural Networks: Tricks of the Trade.
[6] Joshua Glasser,et al. Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data , 2013, 2013 IEEE Security and Privacy Workshops.
[7] Srikanta Tirthapura,et al. Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams , 2017, IEEE Systems Journal.
[8] Ruchi Jain,et al. Hidden Markov Model based anomaly intrusion detection , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[9] Dawn M. Cappelli,et al. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .
[10] Do-hyeon Lee,et al. Multi-Stage Intrusion Detection System Using Hidden Markov Model Algorithm , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).