共 51 条
[1]
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]
Achlioptas Dimitris, 2001, P 20 ACM SIGMOD SIGA, P274, DOI DOI 10.1145/375551.375608
[3]
Aggarwal C. C., 2016, Outlier analysis, V2nd
[4]
Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data
[J].
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS,
2014, 1 (02)
:135-155
[5]
Network Anomaly Detection: Methods, Systems and Tools
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2014, 16 (01)
:303-336
[6]
Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams
[J].
IEEE SYSTEMS JOURNAL,
2017, 11 (02)
:471-482
[8]
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2016, 18 (02)
:1153-1176
[9]
CA Technologies, 2018, 2018 Insider threat report
[10]
Campagna R., ENTERPRISE INSIDER T