Uncovering insider threats from the digital footprints of individuals
暂无分享,去创建一个
Ching-Yung Lin | Shimei Pan | Keith Houck | Yinglong Xia | Steve Wood | Jui-Hsin Lai | Justin D. Weisz | Jie Lu | Danny Soroker | Anni Coden | Michael A. Tanenblatt | Jeff Boston | Julie MacNaught | W. S. Lin
[1] Oliver Brdiczka,et al. Multi-Domain Information Fusion for Insider Threat Detection , 2013, 2013 IEEE Security and Privacy Workshops.
[2] Bertram Ludäscher,et al. Insider Attack Identification and Prevention Using a Declarative Approach , 2014, 2014 IEEE Security and Privacy Workshops.
[3] Alfred O. Hero,et al. Multi-criteria Anomaly Detection using Pareto Depth Analysis , 2011, NIPS.
[4] Hans-Peter Kriegel,et al. Local outlier detection reconsidered: a generalized view on locality with applications to spatial, video, and network outlier detection , 2012, Data Mining and Knowledge Discovery.
[5] Viktor K. Prasanna,et al. Parallel evidence propagation on multicore processors , 2009, The Journal of Supercomputing.
[6] Thomas G. Dietterich,et al. Detecting insider threats in a real corporate database of computer usage activity , 2013, KDD.
[7] Oliver Brdiczka,et al. A Bayesian Network Model for Predicting Insider Threats , 2013, 2013 IEEE Security and Privacy Workshops.
[8] Yee Whye Teh,et al. A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.
[9] Kurt C. Wallnau,et al. Simulating Malicious Insiders in Real Host-Monitored User Data , 2014, CSET.