共 55 条
- [31] Insider Threat Detection with Long Short-Term Memory [J]. PROCEEDINGS OF THE AUSTRALASIAN COMPUTER SCIENCE WEEK MULTICONFERENCE (ACSW 2019), 2019,
- [32] Online masquerade detection resistant to mimicry [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2016, 61 : 162 - 180
- [33] Masquerade detection using enriched command lines [J]. 2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 5 - 14
- [34] Masquerade detection using truncated command lines [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 219 - 228
- [35] Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2018, 15 (02): : 761 - 773
- [36] GRG, 2019, Arxiv, DOI arXiv:1911.05879
- [37] A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models [J]. MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 47 - 56
- [38] A Model-Based Approach to Predicting the Performance of Insider Threat Detection Systems [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 314 - 323
- [39] Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery [J]. INFORMATION PROCESSING IN MEDICAL IMAGING (IPMI 2017), 2017, 10265 : 146 - 157
- [40] Schonlau M, 2001, STAT SCI, V16, P58