{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:59:52Z","timestamp":1742936392465,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319086231"},{"type":"electronic","value":"9783319086248"}],"license":[{"start":{"date-parts":[[2014,9,4]],"date-time":"2014-09-04T00:00:00Z","timestamp":1409788800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,9,4]],"date-time":"2014-09-04T00:00:00Z","timestamp":1409788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-08624-8_9","type":"book-chapter","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T13:40:10Z","timestamp":1409751610000},"page":"201-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cyber Insider Mission Detection for Situation Awareness"],"prefix":"10.1007","author":[{"given":"Haitao","family":"Du","sequence":"first","affiliation":[]},{"given":"Changzhou","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shanchieh Jay","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jai","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,4]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Ali, G., Shaikh, N.A., Shaikh, Z.A.: Towards an automated multiagent system to monitor user activities against insider threat. In: Proceedings of International Symposium on Biometrics and Security Technologies, pp. 1\u20135 (2008)","key":"9_CR1","DOI":"10.1109\/ISBAST.2008.4547660"},{"doi-asserted-by":"crossref","unstructured":"Bertino, E., Ghinita, G.: Towards mechanisms for detection and prevention of data exfiltration by insiders. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 10\u201319 (2011)","key":"9_CR2","DOI":"10.1145\/1966913.1966916"},{"unstructured":"Buford, J.F., Lewis, L., Jakobson, G.: Insider threat detection using situation-aware MAS. In: Proceedings of 11th International Conference on Information Fusion (2008)","key":"9_CR3"},{"doi-asserted-by":"crossref","unstructured":"Hu, Y., Panda, B.: Two-dimensional traceability link rule mining for detection of insider attacks. In: Proceedings of the 43rd Hawaii International Conference on System Sciences (2010)","key":"9_CR4","DOI":"10.1109\/HICSS.2010.414"},{"doi-asserted-by":"crossref","unstructured":"Kohli, H., Lindskog, D., Zavarsky, P., Ruhl, R.: An enhanced threat identification approach for collusion threats. In: Proceedings of Third International Workshop on Security Measurements and Metrics, pp. 25\u201330 (2011)","key":"9_CR5","DOI":"10.1109\/Metrisec.2011.11"},{"unstructured":"Liu Y., Cobett, C., Chiang K., Archibald, R., Mukherjee, B., Ghosal, D.: SIDD: a framework for detecting sensitive data exfiltration by an insider attack. In: Proceedings of the 42nd Hawaii International Conference on System Science (2009)","key":"9_CR6"},{"doi-asserted-by":"crossref","unstructured":"Mathew1, S., Petropoulos, M., Ngo, H.Q., Upadhyaya, S.: A data-centric approach to insider attack detection in database systems. In: Proceedings of the 13th international Conference on Recent advances in intrusion Detection, pp. 382\u2013401 (2010)","key":"9_CR7","DOI":"10.1007\/978-3-642-15512-3_20"},{"unstructured":"Maybury, M., Chase, P., Cheikes, B., Brackney, D., Matzner, S., Hetherington, T., Wood, B., Sibley, C., Marin, J., Longstaff, T.: Analysis and detection of malicious insiders. Technical report, MITRE (2005)","key":"9_CR8"},{"doi-asserted-by":"crossref","unstructured":"Parveen, P., Weger, Z.R., Thuraisingham, B., Hamlen, K., Khan, L.: Surpervised learning for insider threat detection. In: Proceedings of the 23rd IEEE International Conference on Tools with Artificial Intelligence, pp. 1032\u20131039 (2011)","key":"9_CR9","DOI":"10.1109\/ICTAI.2011.176"},{"issue":"1","key":"9_CR10","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/TIFS.2009.2039591","volume":"5","author":"SL Pfleeger","year":"2010","unstructured":"Pfleeger, S.L., Predd, J.B., Hunker, J., Bulford, C.: Insiders behaving badly: addressing bad actors and their actions. IEEE Trans. Inf. Forensics Secur. 5(1), 169\u2013179 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Raissi-Dehkordi, M., Carr, D.: A multi-perspective approach to insider threat detection. In: Proceedings of IEEE Military Communications Conference, pp. 1164\u20131169 (2011)","key":"9_CR11","DOI":"10.1109\/MILCOM.2011.6127457"},{"doi-asserted-by":"crossref","unstructured":"Salem, M.B., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. Insider Attack Cyber Secur. 39, 69\u201390 (2008)","key":"9_CR12","DOI":"10.1007\/978-0-387-77322-3_5"},{"key":"9_CR13","first-page":"345","volume":"2","author":"E Santos","year":"2008","unstructured":"Santos, E., Nguyen, H., Yu, F., Kim, K., Li, D., Wilkinson, J.T., Olson, A., Jacob, R.: Intent-driven insider threat detection in intelligence analyses. Proc. IEEE\/WIC\/ACM Int. Conf. Web Intell. Intell. Agent Technol. 2, 345\u2013349 (2008)","journal-title":"Proc. IEEE\/WIC\/ACM Int. Conf. Web Intell. Intell. Agent Technol."},{"unstructured":"Singh, S., Silakari, S.: A survey of cyber attack detection systems. Int. J. Comput. Sci. Netw. Secur. 9(5) (2009)","key":"9_CR14"},{"key":"9_CR15","volume-title":"A Course on Fuzzy Systems","author":"LX Wang","year":"1999","unstructured":"Wang, L.X.: A Course on Fuzzy Systems. Prentice-Hall press, USA (1999)"},{"doi-asserted-by":"crossref","unstructured":"Yager, R.R.: On ordered weighted averaging aggregation operators in multicriteria decisionmaking. IEEE Trans. Syst Man Cybern. 18(1), 183\u2013190 (1988)","key":"9_CR16","DOI":"10.1109\/21.87068"},{"doi-asserted-by":"crossref","unstructured":"Yang, J., Ray, L., Zhao, G.: Detect stepping-stone insider attacks by network traffic mining and dynamic programming. In: Proceedings of the 2011 International Conference on Advanced Information Networking and Applications, pp. 151\u2013158 (2011)","key":"9_CR17","DOI":"10.1109\/AINA.2011.33"}],"container-title":["Studies in Computational Intelligence","Intelligent Methods for Cyber Warfare"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08624-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T10:12:03Z","timestamp":1676887923000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-08624-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,4]]},"ISBN":["9783319086231","9783319086248"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08624-8_9","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014,9,4]]},"assertion":[{"value":"4 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}