共 55 条
- [2] Al-Anzi FS, 2017, J KING SAUD UNIV-COM, V29, P189, DOI 10.1016/j.jksuci.2016.04.001
- [3] [Anonymous], 2020, 2020 insider threat report
- [4] [Anonymous], 2020, Data breach investigations report
- [5] Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2014, 1 (02): : 135 - 155
- [6] Network Anomaly Detection: Methods, Systems and Tools [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01): : 303 - 336
- [7] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
- [8] Scenario-Based Insider Threat Detection From Cyber Activities [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2018, 5 (03): : 660 - 675
- [9] Chen LW, 2006, LECT NOTES COMPUT SC, V4064, P37
- [10] Collins M. L.., 2016, Technical report CMU/SEI-2015-TR-010, Vfifth