共 42 条
[1]
[Anonymous], 2021, ACC STAT CYB RES 202
[3]
Insider Threat Detection Through Attributed Graph Clustering
[J].
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS,
2017,
:112-119
[4]
Profiling users in GUI based systems for masquerade detection
[J].
2006 IEEE INFORMATION ASSURANCE WORKSHOP,
2006,
:48-+
[5]
Gavai G., 2015, P 7 ACM CCS INT WORK, P13
[6]
Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data
[J].
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013),
2013,
:98-104
[7]
Hamilton WL, 2017, ADV NEUR IN, V30
[9]
Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection
[J].
MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM),
2019,