ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Few-shot Insider Threat Detection
Proceedings of the 29th ACM International Conference on Information & Knowledge Management
◽
10.1145/3340531.3412161
◽
2020
◽
Author(s):
Shuhan Yuan
◽
Panpan Zheng
◽
Xintao Wu
◽
Hanghang Tong
Keyword(s):
Insider Threat
◽
Threat Detection
Download Full-text
Related Documents
Cited By
References
Insider Threat Detection Using An Unsupervised Learning Method: COPOD
2021 International Conference on Communications, Information System and Computer Engineering (CISCE)
◽
10.1109/cisce52179.2021.9445898
◽
2021
◽
Author(s):
Xiaoshuang Sun
◽
Yu Wang
◽
Zengkai Shi
Keyword(s):
Unsupervised Learning
◽
Insider Threat
◽
Threat Detection
◽
Learning Method
Download Full-text
Deep learning for insider threat detection: Review, challenges and opportunities
Computers & Security
◽
10.1016/j.cose.2021.102221
◽
2021
◽
Vol 104
◽
pp. 102221
Author(s):
Shuhan Yuan
◽
Xintao Wu
Keyword(s):
Deep Learning
◽
Insider Threat
◽
Threat Detection
◽
Challenges And Opportunities
Download Full-text
Insider Threat Detection Through Attributed Graph Clustering
2017 IEEE Trustcom/BigDataSE/ICESS
◽
10.1109/trustcom/bigdatase/icess.2017.227
◽
2017
◽
Cited By ~ 1
Author(s):
Anagi Gamachchi
◽
Serdar Boztas
Keyword(s):
Graph Clustering
◽
Insider Threat
◽
Threat Detection
◽
Attributed Graph
Download Full-text
A benchmark for visual analysis of insider threat detection
Science China Information Sciences
◽
10.1007/s11432-019-2776-4
◽
2021
◽
Vol 65
(9)
◽
Author(s):
Ying Zhao
◽
Kui Yang
◽
Siming Chen
◽
Zhuo Zhang
◽
Xin Huang
◽
...
Keyword(s):
Visual Analysis
◽
Insider Threat
◽
Threat Detection
Download Full-text
Insider Threat Detection: Machine Learning Way
Versatile Cybersecurity - Advances in Information Security
◽
10.1007/978-3-319-97643-3_2
◽
2018
◽
pp. 19-53
◽
Cited By ~ 1
Author(s):
Mehul S. Raval
◽
Ratnik Gandhi
◽
Sanjay Chaudhary
Keyword(s):
Machine Learning
◽
Insider Threat
◽
Threat Detection
Download Full-text
An Insider Threat Detection Method Based on User Behavior Analysis
IFIP Advances in Information and Communication Technology - Intelligent Information Processing IX
◽
10.1007/978-3-030-00828-4_43
◽
2018
◽
pp. 421-429
Author(s):
Wei Jiang
◽
Yuan Tian
◽
Weixin Liu
◽
Wenmao Liu
Keyword(s):
Behavior Analysis
◽
Detection Method
◽
User Behavior
◽
Insider Threat
◽
Threat Detection
◽
User Behavior Analysis
Download Full-text
Data Mining and Insider Threat Detection
Big Data Analytics with Applications in Insider Threat Detection
◽
10.1201/9781315119458-7
◽
2017
◽
pp. 67-78
Author(s):
Bhavani Thuraisingham
◽
Mohammad Mehedy Masud
◽
Pallabi Parveen
◽
Latifur Khan
Keyword(s):
Data Mining
◽
Insider Threat
◽
Threat Detection
Download Full-text
Insider Threat Detection as a Stream Mining Problem
Big Data Analytics with Applications in Insider Threat Detection
◽
10.1201/9781315119458-17
◽
2017
◽
pp. 183-188
Author(s):
Bhavani Thuraisingham
◽
Mohammad Mehedy Masud
◽
Pallabi Parveen
◽
Latifur Khan
Keyword(s):
Insider Threat
◽
Threat Detection
◽
Stream Mining
Download Full-text
Ensemble Strategy for Insider Threat Detection from User Activity Logs
Computers Materials & Continua
◽
10.32604/cmc.2020.09649
◽
2020
◽
Vol 65
(2)
◽
pp. 1321-1334
Author(s):
Shihong Zou
◽
Huizhong Sun
◽
Guosheng Xu
◽
Ruijie Quan
Keyword(s):
Insider Threat
◽
Threat Detection
◽
Ensemble Strategy
◽
User Activity
Download Full-text
Advanced insider threat detection model to apply periodic work atmosphere
KSII Transactions on Internet and Information Systems
◽
10.3837/tiis.2019.03.035
◽
2019
◽
Vol 13
(3)
◽
Keyword(s):
Insider Threat
◽
Threat Detection
◽
Detection Model
◽
Work Atmosphere
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close