G. Pannell and H. Ashman, Anomaly detection over user profiles for intrusion detection, 2012.

X. Liu, F. Zhang, and L. Ye, User behavior mining algorithm design based on NetFlow, Research, vol.26, issue.2, pp.319-321, 2009.

Y. Lian, Y. Dai, and H. Wang, User behavior anomaly detection based on pattern Mining, Journal of Computer Science, vol.25, issue.3, pp.325-330, 2002.

L. Wang, N. A. , X. Wu, and D. Fang, Behavior pattern mining in Intrusion Detection system, Journal of Communications, vol.25, issue.7, pp.168-175, 2004.

J. B. Camina, C. Hernandez-gracidas, R. Monroy, and L. Trejo, The Windows-Users and-Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms, Expert Systems with Applications, vol.41, issue.3, pp.919-930, 2014.

A. Gamachchi and . Boztas, Insider Threat Detection Through Attributed Graph Clustering, Trustcom/bigdatase/icess, vol.2017, pp.112-119

M. Kandias, V. Stavrou, N. Bozovic, L. Mitrou, and D. Gritzalis, Can we trust this user? predicting insider's attitude via youtube usage profiling, IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pp.347-354, 2013.

B. M. Bowen, M. B. Salem, S. Hershkop, A. D. Keromytis, and S. J. Stolfo, Designing host and network sensors to mitigate the insider threat, IEEE Secur. Privacy, vol.7, issue.6, pp.22-29, 2009.

M. A. Maloof and G. D. Stephens, ELICIT: A system for detecting insiders who violate need-to-know," in Recent Advances in Intrusion Detection, pp.146-166, 2007.

W. Eberle, J. Graves, and L. Holder, Insider threat detection using a graph-based approach, Journal of Applied Security Research, vol.6, issue.1, pp.32-81, 2010.

J. Myers, M. R. Grimaila, and R. F. Mills, Towards insider threat detection using web server logs, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, vol.54, p.4, 2009.

H. Eldardiry, E. Bart, J. Liu, J. Hanley, B. Price et al., Multi-domain information fusion for insider threat detection, p.2013, 2013.

S. Andropov, M. Guirik, M. Budko, and . Budkonetwork, Anomaly detection using artificial neural networks, Open Innovations Association, pp.26-31, 2017.

T. Rashid, . Agrafiotis, and . Nurse, A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models, International Workshop, pp.47-56, 2016.