{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T22:27:52Z","timestamp":1750112872186,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319748597"},{"type":"electronic","value":"9783319748603"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-74860-3_6","type":"book-chapter","created":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T04:34:39Z","timestamp":1516250079000},"page":"91-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Probabilistic Modeling of Insider Threat Detection Systems"],"prefix":"10.1007","author":[{"given":"Brian","family":"Ruttenberg","sequence":"first","affiliation":[]},{"given":"Dave","family":"Blumstein","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"Druce","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Howard","sequence":"additional","affiliation":[]},{"given":"Fred","family":"Reed","sequence":"additional","affiliation":[]},{"given":"Leslie","family":"Wilfong","sequence":"additional","affiliation":[]},{"given":"Crystal","family":"Lister","sequence":"additional","affiliation":[]},{"given":"Steve","family":"Gaskin","sequence":"additional","affiliation":[]},{"given":"Meaghan","family":"Foley","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Scofield","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,19]]},"reference":[{"key":"6_CR1","unstructured":"INSA\u2019s Security Policy Reform Council: Assessing the mind of the malicious insider. Technical report, Intelligence and National Security Alliance (2017). \nhttps:\/\/www.insaonline.org\/"},{"key":"6_CR2","unstructured":"Ester, M., Kriegel, H.P., Sander, J., Xu, X., et al.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD, vol. 96, pp. 226\u2013231 (1996)"},{"key":"6_CR3","unstructured":"Friedman, N., Getoor, L., Koller, D., Pfeffer, A.: Learning probabilistic relational models. In: IJCAI, vol. 99, pp. 1300\u20131309 (1999)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Glasser, J., Lindauer, B.: Bridging the gap: a pragmatic approach to generating insider threat data. In: Security and Privacy Workshops (SPW), pp. 98\u2013104. IEEE (2013)","DOI":"10.1109\/SPW.2013.37"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Goodman, N.D.: The principles and practice of probabilistic programming. In: Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 399\u2013402. ACM (2013)","DOI":"10.1145\/2429069.2429117"},{"key":"6_CR6","volume-title":"An Introduction to Bayesian Networks","author":"FV Jensen","year":"1996","unstructured":"Jensen, F.V.: An Introduction to Bayesian Networks, vol. 210. UCL Press, London (1996)"},{"key":"6_CR7","unstructured":"NPR: Ex-NSA contractor accused of taking classified information is indicted (2013). \nhttp:\/\/www.npr.org\/sections\/thetwo-way\/2017\/02\/09\/514275544\/ex-nsa-contractor-indicted-for-taking-classifed-information"},{"key":"6_CR8","unstructured":"Pfeffer, A.: Creating and manipulating probabilistic programs with Figaro. In: 2nd International Workshop on Statistical Relational AI (2012)"},{"key":"6_CR9","volume-title":"Practical Probabilistic Programming","author":"A Pfeffer","year":"2016","unstructured":"Pfeffer, A.: Practical Probabilistic Programming. Manning Publications, Cherry Hill (2016)"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-10861-0","volume-title":"Automatic Differentiation: Techniques and Applications","year":"1981","unstructured":"Rall, L.B. (ed.): Automatic Differentiation: Techniques and Applications. LNCS, vol. 120. Springer, Heidelberg (1981). \nhttps:\/\/doi.org\/10.1007\/3-540-10861-0"},{"key":"6_CR11","unstructured":"Ruttenberg, B.E., Pfeffer, A.: Decision-making with complex data structures using probabilistic programming. arXiv preprint \narXiv:1407.3208\n\n (2014)"},{"key":"6_CR12","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-0-387-77322-3_5","volume-title":"Insider Attack and Cyber Security","author":"MB Salem","year":"2008","unstructured":"Salem, M.B., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. In: Stolfo, S.J., Bellovin, S.M., Keromytis, A.D., Hershkop, S., Smith, S.W., Sinclair, S. (eds.) Insider Attack and Cyber Security. Advances in Information Security, vol. 39, pp. 69\u201390. Springer, Boston (2008). \nhttps:\/\/doi.org\/10.1007\/978-0-387-77322-3_5"},{"issue":"6","key":"6_CR13","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1287\/opre.34.6.871","volume":"34","author":"RD Shachter","year":"1986","unstructured":"Shachter, R.D.: Evaluating influence diagrams. Oper. Res. 34(6), 871\u2013882 (1986)","journal-title":"Oper. Res."},{"key":"6_CR14","unstructured":"New York Times: A lawsuit against Uber highlights the rush to conquer driverless cars (2017). \nhttps:\/\/nyti.ms\/2kVzR8Z"}],"container-title":["Lecture Notes in Computer Science","Graphical Models for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-74860-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,20]],"date-time":"2018-02-20T01:35:56Z","timestamp":1519090556000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-74860-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319748597","9783319748603"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-74860-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}