Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams
暂无分享,去创建一个
Srikanta Tirthapura | Yung-Yu Chung | Donald Steiner | Bhargav Avasarala | Brock Bose | Y. Chung | S. Tirthapura | Bhargav Avasarala | Brock Bose | Donald Steiner
[1] Joshua Glasser,et al. Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data , 2013, 2013 IEEE Security and Privacy Workshops.
[2] Randall F. Trzeciak,et al. Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector , 2012 .
[3] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[4] Jon Louis Bentley,et al. Decomposable Searching Problems I: Static-to-Dynamic Transformation , 1980, J. Algorithms.
[5] Jon Louis Bentley,et al. Multidimensional binary search trees used for associative searching , 1975, CACM.
[6] Jay Kreps,et al. Kafka : a Distributed Messaging System for Log Processing , 2011 .
[7] Bilegsaikhan Naidan,et al. Static-to-dynamic transformation for metric indexing structures (extended version) , 2014, Inf. Syst..
[8] Oliver Brdiczka,et al. Multi-Domain Information Fusion for Insider Threat Detection , 2013, 2013 IEEE Security and Privacy Workshops.
[9] James Andrew Lewis,et al. The economic impact of cybercrime and cyber espionage , 2013 .