共 57 条
[11]
Uncovering Lateral Movement Using Authentication Logs
[J].
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT,
2021, 18 (01)
:1049-1063
[12]
Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams
[J].
IEEE SYSTEMS JOURNAL,
2017, 11 (02)
:471-482
[14]
Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
[J].
PROCEEDINGS OF THE 1ST WORKSHOP ON MACHINE LEARNING FOR COMPUTING SYSTEMS (MLCS 2018),
2018,
[16]
Campagna R., ENTERPRISE INSIDER T
[18]
Collins M. L, 2016, CMUSEI2015T010 CERT
[19]
Crowd Research Partners, 2018, REP
[20]
CSO CERT Division of SEI-CMU U.S. Secret Service and KnowBe4, 2018, REP