共 42 条
[1]
Al-Mhiqani M.N., 2018, International Journal of Information Systems and Management, V1, P343, DOI [10.1504/IJISAM.2018.094777, DOI 10.1504/IJISAM.2018.10014439]
[2]
A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations
[J].
APPLIED SCIENCES-BASEL,
2020, 10 (15)
[6]
[Anonymous], 2018, INSIDER THREAT 2018
[7]
[Anonymous], 2020, 2020 insider threat report
[8]
An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications
[J].
2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2,
2013,
:54-59
[9]
Bisong E., 2019, GOOGLE COLABORATORY
[10]
Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams
[J].
IEEE SYSTEMS JOURNAL,
2017, 11 (02)
:471-482