4.6 Article

Applying One-Class Algorithms for Data Stream-Based Insider Threat Detection

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Deep learning for insider threat detection: Review, challenges and opportunities

Shuhan Yuan et al.

Summary: Insider threats are one of the most challenging threats in cyberspace, and traditional machine learning based detection methods struggle to accurately capture the behavior differences between insiders and normal users. Deep learning models show potential in improving the performance of insider threat detection, but face challenges such as lack of labeled data and adaptive attacks.

COMPUTERS & SECURITY (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Algorithm Recommendation for Data Streams

Jader M. C. de Sa et al.

Summary: The paper explores the issue of data stream algorithm selection in dynamic environments, proposing an enhanced framework that uses meta-learning and incremental learning to choose the best algorithm to combat model decay caused by non-stationary data streams.

2020 25TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR) (2021)

Review Chemistry, Multidisciplinary

A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations

Mohammed Nasser Al-Mhiqani et al.

APPLIED SCIENCES-BASEL (2020)

Review Computer Science, Information Systems

Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses

Neetesh Saxena et al.

ELECTRONICS (2020)

Article Computer Science, Artificial Intelligence

Employee profiling via aspect-based sentiment and network for insider threats detection

Charlie Soh et al.

EXPERT SYSTEMS WITH APPLICATIONS (2019)

Article Chemistry, Multidisciplinary

Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms

Junhong Kim et al.

APPLIED SCIENCES-BASEL (2019)

Article Computer Science, Information Systems

Resample-Based Ensemble Framework for Drifting Imbalanced Data Streams

Hang Zhang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Detecting and Preventing Cyber Insider Threats: A Survey

Liu Liu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Artificial Intelligence

Real-Time Dynamic Network Anomaly Detection

Jordan Noble et al.

IEEE INTELLIGENT SYSTEMS (2018)

Article Computer Science, Cybernetics

Scenario-Based Insider Threat Detection From Cyber Activities

Pratik Chattopadhyay et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2018)

Article Computer Science, Information Systems

Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams

Brock Bose et al.

IEEE SYSTEMS JOURNAL (2017)

Article Computer Science, Theory & Methods

A Survey on Ensemble Learning for Data Stream Classification

Heitor Murilo Gomes et al.

ACM COMPUTING SURVEYS (2017)

Article Computer Science, Artificial Intelligence

One-class classifiers with incremental learning and forgetting for data streams with concept drift

Bartosz Krawczyk et al.

SOFT COMPUTING (2015)

Review Computer Science, Artificial Intelligence

One-class classification: taxonomy of study and review of techniques

Shehroz S. Khan et al.

KNOWLEDGE ENGINEERING REVIEW (2014)

Article Computer Science, Artificial Intelligence

EVOLVING INSIDER THREAT DETECTION STREAM MINING PERSPECTIVE

Pallabi Parveen et al.

INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS (2013)

Proceedings Paper Computer Science, Theory & Methods

Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data

Joshua Glasser et al.

IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013) (2013)

Article Mathematics, Applied

Active learning approach to concept drift problem

Bartosz Kurlej et al.

LOGIC JOURNAL OF THE IGPL (2012)

Article Computer Science, Artificial Intelligence

Random forests

L Breiman

MACHINE LEARNING (2001)