Anomaly detection over user profiles for intrusion detection, 2012. ,
User behavior mining algorithm design based on NetFlow, Research, vol.26, issue.2, pp.319-321, 2009. ,
User behavior anomaly detection based on pattern Mining, Journal of Computer Science, vol.25, issue.3, pp.325-330, 2002. ,
Behavior pattern mining in Intrusion Detection system, Journal of Communications, vol.25, issue.7, pp.168-175, 2004. ,
The Windows-Users and-Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms, Expert Systems with Applications, vol.41, issue.3, pp.919-930, 2014. ,
Insider Threat Detection Through Attributed Graph Clustering, Trustcom/bigdatase/icess, vol.2017, pp.112-119 ,
Can we trust this user? predicting insider's attitude via youtube usage profiling, IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pp.347-354, 2013. ,
Designing host and network sensors to mitigate the insider threat, IEEE Secur. Privacy, vol.7, issue.6, pp.22-29, 2009. ,
ELICIT: A system for detecting insiders who violate need-to-know," in Recent Advances in Intrusion Detection, pp.146-166, 2007. ,
Insider threat detection using a graph-based approach, Journal of Applied Security Research, vol.6, issue.1, pp.32-81, 2010. ,
Towards insider threat detection using web server logs, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, vol.54, p.4, 2009. ,
Multi-domain information fusion for insider threat detection, p.2013, 2013. ,
Anomaly detection using artificial neural networks, Open Innovations Association, pp.26-31, 2017. ,
A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models, International Workshop, pp.47-56, 2016. ,