共 35 条
[1]
Afzal MZ, 2015, PROC INT CONF DOC, P1111, DOI 10.1109/ICDAR.2015.7333933
[3]
Ba JimmyLei., 2016, CORR
[4]
Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles
[J].
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2021,
2021, 625
:367-381
[5]
Cullen M., 2011, ANN C SOC IND ORG PS
[6]
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1285-1298
[7]
Image-Based Feature Representation for Insider Threat Classification
[J].
APPLIED SCIENCES-BASEL,
2020, 10 (14)
[8]
Ge Dingwei, 2022, 2022 3rd International Conference on Electronics, Communications and Information Technology (CECIT), P359, DOI 10.1109/CECIT58139.2022.00069
[10]
Gurucul, 2023, 2023 INS THREAT REP