{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T15:34:48Z","timestamp":1778081688634,"version":"3.51.4"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319491080","type":"print"},{"value":"9783319491097","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_44","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T05:03:15Z","timestamp":1477026195000},"page":"467-478","source":"Crossref","is-referenced-by-count":6,"title":["Business Process Mining based Insider Threat Detection System"],"prefix":"10.1007","author":[{"given":"Taiming","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Yuanbo","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Ankang","family":"Ju","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"44_CR1","unstructured":"Anderson R H, Bozek T, Longstaff T, et al. Research on mitigating the insider threat to information systems-# 2. RAND NATIONAL DEFENSE RESEARCH INST SANTA MONICA CA(2000)."},{"key":"44_CR2","unstructured":"Spitzner L. Honeypots: Catching the insider threat. Computer Security Applications Conference, 2003. Proceedings. 19th Annual. IEEE. (2003) 170-179."},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Hu N, Bradford P G, Liu J. Applying role based access control and genetic algorithms to insider threat detection. Proceedings of the 44th annual Southeast regional conference. ACM (2006) 790-791.","DOI":"10.1145\/1185448.1185638"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Bishop M, Engle S, Peisert S, et al. We have met the enemy and he is us. \/Proceedings of the 2008 workshop on New security paradigms. ACM (2009) 1-12.","DOI":"10.1145\/1595676.1595678"},{"key":"44_CR5","unstructured":"Greitzer F L, Frincke D A. Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation. Insider Threats in Cyber Security. Springer US (2010) 85-113."},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Brdiczka O, Liu J, Price B, et al. Proactive insider threat detection through graph learning and psychological context. Security and Privacy Workshops (SPW), 2012 IEEE Symposium on. IEEE (2012) 142-149.","DOI":"10.1109\/SPW.2012.29"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Parveen P, Evans J, Thuraisingham B, et al. Insider threat detection using stream mining and graph mining. Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on. IEEE (2011) 1102-1110.","DOI":"10.1109\/PASSAT\/SocialCom.2011.211"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Parveen P, Thuraisingham B. Unsupervised incremental sequence learning for insider threat detection. Intelligence and Security Informatics (ISI), 2012 IEEE International Conference on. IEEE (2012) 141-143.","DOI":"10.1109\/ISI.2012.6284271"},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Van der Aalst W M P, de Medeiros A K A. Process mining and security: Detecting anomalous process executions and checking process conformance. Electronic Notes in Theoretical Computer Science (2005) 121: 3-21.","DOI":"10.1016\/j.entcs.2004.10.013"},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"Van der Aalst W, Weijters T, Maruster L. Workflow mining: Discovering process models from event logs. Knowledge and Data Engineering, IEEE Transactions on (2004) 16(9): 1128-1142.","DOI":"10.1109\/TKDE.2004.47"},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Wen L, Wang J, Sun J. Detecting implicit dependencies between tasks from event log. Frontiers of WWW Research and Development-APWeb 2006 (2006) 591-603.","DOI":"10.1007\/11610113_52"},{"key":"44_CR12","unstructured":"De Medeiros A K A, Weijters A. Genetic process mining. Applications and Theory of Petri Nets 2005, volume 3536 of Lecture Notes in Computer Science (2005)"},{"key":"44_CR13","doi-asserted-by":"crossref","unstructured":"Van der Aalst W M P, van Dongen B F, G\u00fcnther C W, et al. ProM: The Process Mining Toolkit. BPM (Demos) (2009) 489: 31.","DOI":"10.1007\/978-0-387-39940-9_1477"},{"key":"44_CR14","unstructured":"Burattin A, Sperduti A. PLG: A Framework for the Generation of Business Process Models and Their Execution Logs. Business Process Management Workshops. Springer Berlin Heidelberg (2011) 214-219."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,10]],"date-time":"2022-07-10T18:41:27Z","timestamp":1657478487000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_44","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}