共 42 条
- [1] [Anonymous], 2021, ACC STAT CYB RES 202
- [3] Insider Threat Detection Through Attributed Graph Clustering [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 112 - 119
- [4] Profiling users in GUI based systems for masquerade detection [J]. 2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, : 48 - +
- [5] Gavai G., 2015, P 7 ACM CCS INT WORK, P13, DOI DOI 10.1145/2808783.2808784
- [6] Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data [J]. IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 98 - 104
- [7] Hamilton WL, 2017, ADV NEUR IN, V30
- [9] Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection [J]. MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,