{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T00:40:09Z","timestamp":1748652009489,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319241760"},{"type":"electronic","value":"9783319241777"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24177-7_20","type":"book-chapter","created":{"date-parts":[[2015,10,9]],"date-time":"2015-10-09T14:47:11Z","timestamp":1444402031000},"page":"396-414","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users"],"prefix":"10.1007","author":[{"given":"Youngja","family":"Park","sequence":"first","affiliation":[]},{"given":"Ian M.","family":"Molloy","sequence":"additional","affiliation":[]},{"given":"Suresh N.","family":"Chari","sequence":"additional","affiliation":[]},{"given":"Zenglin","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Gates","sequence":"additional","affiliation":[]},{"given":"Ninghi","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,18]]},"reference":[{"key":"20_CR1","unstructured":"Chang, E.I., Lippmann, R.P.: Using voice transformations to create additional training talkers for word spotting. In: Advances in Neural Information Processing Systems, pp. 875\u2013882 (1995)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Theiler, J., Cai, D.M.: Resampling approach for anomaly detection in multispectral images. In: Proceedings of the SPIE, pp. 230\u2013240 (2003)","DOI":"10.1117\/12.487069"},{"issue":"5","key":"20_CR3","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s10115-003-0132-7","volume":"6","author":"W Fan","year":"2004","unstructured":"Fan, W., Miller, M., Stolfo, S., Lee, W., Chan, P.: Using artificial anomalies to detect unknown and known network intrusions. Knowl. Inf. Syst. 6(5), 507\u2013527 (2004)","journal-title":"Knowl. Inf. Syst."},{"issue":"2","key":"20_CR4","first-page":"83","volume":"27","author":"T Hastie","year":"2005","unstructured":"Hastie, T., Tibshirani, R., Friedman, J., Franklin, J.: The elements of statistical learning: data mining, inference and prediction. The Math. Intelligencer 27(2), 83\u201385 (2005)","journal-title":"The Math. Intelligencer"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-540-87479-9_51","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"K Hempstalk","year":"2008","unstructured":"Hempstalk, K., Frank, E., Witten, I.H.: One-class classification by combining density and class probability estimation. In: Daelemans, W., Goethals, B., Morik, K. (eds.) ECML PKDD 2008, Part I. LNCS (LNAI), vol. 5211, pp. 505\u2013519. Springer, Heidelberg (2008)"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: LOF: Identifying density-based local outliers. In: ACM Sigmod Record, vol. 29, no. 2, pp. 93\u2013104. ACM (2000)","DOI":"10.1145\/335191.335388"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Bishop, C.M.: Novelty detection and neural network validation. In: IEE Proceedings Vision, Image and Signal Processing, vol. 141, no. 4, pp. 217\u2013222. IET (1994)","DOI":"10.1049\/ip-vis:19941330"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms forkeystroke dynamics. In: IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2009, pp. 125\u2013134 (2009)","DOI":"10.1109\/DSN.2009.5270346"},{"key":"20_CR9","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Kdd, vol. 96, pp. 226\u2013231 (1996)"},{"key":"20_CR10","volume-title":"RapidMiner: Data Mining Use Cases and Business Analytics Applications","author":"M Hofmann","year":"2013","unstructured":"Hofmann, M., Klinkenberg, R.: RapidMiner: Data Mining Use Cases and Business Analytics Applications. CRC Press, Boca Raton (2013)"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/978-3-319-11212-1_22","volume-title":"Computer Security - ESORICS 2014","author":"C Gates","year":"2014","unstructured":"Gates, C., Li, N., Xu, Z., Chari, S.N., Molloy, I., Park, Y.: Detecting insider information theft using features from file access logs. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ICAIS 2014, Part II. LNCS, vol. 8713, pp. 383\u2013400. Springer, Heidelberg (2014)"},{"key":"20_CR12","unstructured":"Canu, S., Grandvalet, Y., Guigue, V., Rakotomamonjy, A.: Svm and kernel methods matlab toolbox. Perception Systmes et Information, INSA de Rouen, Rouen, France (2005)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Salem, M., Hershkop, S., Stolfo, S.: A survey of insider attack detection research. In: Insider Attack and Cyber Security, pp. 69\u201390 (2008)","DOI":"10.1007\/978-0-387-77322-3_5"},{"issue":"3","key":"20_CR14","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"2","key":"20_CR15","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"SE\u201313","author":"DE Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE\u201313(2), 222\u2013232 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"20_CR16","unstructured":"Javitz, H.S., Valdes, A.: The SRI IDES statistical anomaly detector. In: Research in Security and Privacy (1991)"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-36084-0_3","volume-title":"Recent Advances in Intrusion Detection","author":"F Apap","year":"2002","unstructured":"Apap, F., Honig, A., Hershkop, S., Eskin, E., Stolfo, S.J.: Detecting malicious software by monitoring anomalous windows registry accesses. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, pp. 36\u201353. Springer, Heidelberg (2002)"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/11425274_2","volume-title":"Foundations of Intelligent Systems","author":"SJ Stolfo","year":"2005","unstructured":"Stolfo, S.J., Hershkop, S., Bui, L.H., Ferster, R., Wang, K.: Anomaly detection in computer security and an application to file system accesses. In: Hacid, M.-S., Murray, N.V., Ra\u015b, Z.W., Tsumoto, S. (eds.) ISMIS 2005. LNCS (LNAI), vol. 3488, pp. 14\u201328. Springer, Heidelberg (2005). http:\/\/dx.doi.org\/10.1007\/11425274_2"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Chen, Y., Malin, B.: Detection of anomalous insiders in collaborative environments via relational analysis of access logs. In: CODASPY 2011: Proceedings of the First ACM Conference on Data and Application Security and Privacy, Feb 2011","DOI":"10.1145\/1943513.1943524"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Papadimitriou, S., Kitagawa, H., Gibbons, P.B., Faloutsos, C.: Loci: Fast outlier detection using the local correlation integral. In: Dayal, U., Ramamritham, K., Vijayaraman, T.M. (eds.) ICDE, pp. 315\u2013326. IEEE Computer Society (2003)","DOI":"10.1109\/ICDE.2003.1260802"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Wang, Y., Parthasarathy, S., Tatikonda, S.: Locality sensitive outlier detection: A ranking driven approach. In: Abiteboul, S., Bhm, K., Koch, C., Tan, K.-L. (eds.) ICDE, pp. 410\u2013421. IEEE Computer Society (2011)","DOI":"10.1109\/ICDE.2011.5767852"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Senator, T.E., Goldberg, H.G., Memory, A., Young, W.T., Rees, B., Pierce, R., Huang, D., Reardon, M., Bader, D.A., Chow, E., Essa, I., Jones, J., Bettadapura, V., Chau, D.H., Green, O., Kaya, O., Zakrzewska, A., Briscoe, E., Mappus, R.I.L., McColl, R., Weiss, L., Dietterich, T.G., Fern, A., Wong, W.-K., Das, S., Emmott, A., Irvine, J., Lee, J.-Y., Koutra, D., Faloutsos, C., Corkill, D., Friedland, L., Gentzel, A., Jensen, D.: Detecting insider threats in a real corporate database of computer usage activity. In: KDD 2013: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM Request Permissions, Aug 2013","DOI":"10.1145\/2487575.2488213"}],"container-title":["Lecture Notes in Computer Science","Computer Security -- ESORICS 2015"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24177-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T00:03:44Z","timestamp":1748649824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24177-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319241760","9783319241777"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24177-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"18 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}