Related references
Note: Only part of the references are listed.Deep learning for insider threat detection: Review, challenges and opportunities
Shuhan Yuan et al.
COMPUTERS & SECURITY (2021)
Algorithm Recommendation for Data Streams
Jader M. C. de Sa et al.
2020 25TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR) (2021)
A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations
Mohammed Nasser Al-Mhiqani et al.
APPLIED SCIENCES-BASEL (2020)
Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
Neetesh Saxena et al.
ELECTRONICS (2020)
Employee profiling via aspect-based sentiment and network for insider threats detection
Charlie Soh et al.
EXPERT SYSTEMS WITH APPLICATIONS (2019)
Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms
Junhong Kim et al.
APPLIED SCIENCES-BASEL (2019)
Resample-Based Ensemble Framework for Drifting Imbalanced Data Streams
Hang Zhang et al.
IEEE ACCESS (2019)
Detecting and Preventing Cyber Insider Threats: A Survey
Liu Liu et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)
Real-Time Dynamic Network Anomaly Detection
Jordan Noble et al.
IEEE INTELLIGENT SYSTEMS (2018)
Scenario-Based Insider Threat Detection From Cyber Activities
Pratik Chattopadhyay et al.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2018)
Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams
Brock Bose et al.
IEEE SYSTEMS JOURNAL (2017)
A Survey on Ensemble Learning for Data Stream Classification
Heitor Murilo Gomes et al.
ACM COMPUTING SURVEYS (2017)
One-class classifiers with incremental learning and forgetting for data streams with concept drift
Bartosz Krawczyk et al.
SOFT COMPUTING (2015)
One-class classification: taxonomy of study and review of techniques
Shehroz S. Khan et al.
KNOWLEDGE ENGINEERING REVIEW (2014)
EVOLVING INSIDER THREAT DETECTION STREAM MINING PERSPECTIVE
Pallabi Parveen et al.
INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS (2013)
Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data
Joshua Glasser et al.
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013) (2013)
Active learning approach to concept drift problem
Bartosz Kurlej et al.
LOGIC JOURNAL OF THE IGPL (2012)