{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T16:26:12Z","timestamp":1747153572759,"version":"3.40.5"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819772438"},{"type":"electronic","value":"9789819772445"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-7244-5_2","type":"book-chapter","created":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T17:02:38Z","timestamp":1724778158000},"page":"17-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TS-AUBD: A Novel Two-Stage Method for\u00a0Abnormal User Behavior Detection"],"prefix":"10.1007","author":[{"given":"Yu","family":"Cao","sequence":"first","affiliation":[]},{"given":"Yilu","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3554-3219","authenticated-orcid":false,"given":"Ye","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Zhaoquan","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,28]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107597","volume":"97","author":"MN Al-Mhiqani","year":"2022","unstructured":"Al-Mhiqani, M.N., et al.: A new intelligent multilayer framework for insider threat detection. Comput. Electr. Eng. 97, 107597 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Aldairi, M., Karimi, L., Joshi, J.: A trust aware unsupervised learning approach for insider threat detection. In: 2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI), pp. 89\u201398 (2019)","DOI":"10.1109\/IRI.2019.00027"},{"key":"2_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103066","volume":"126","author":"M AlSlaiman","year":"2023","unstructured":"AlSlaiman, M., Salman, M.I., Saleh, M.M., Wang, B.: Enhancing false negative and positive rates for efficient insider threat detection. Comput. Secur. 126, 103066 (2023)","journal-title":"Comput. Secur."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Besnaci, S., Hafidi, M., Lamia, M.: Dealing with extremly unbalanced data and detecting insider threats with deep neural networks. In: 2023 International Conference on Advances in Electronics, Control and Communication Systems (ICAECCS), pp.\u00a01\u20136 (2023)","DOI":"10.1109\/ICAECCS56710.2023.10105103"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Ge, D., Zhong, S., Chen, K.: Multi-source data fusion for insider threat detection using residual networks. In: 2022 3rd International Conference on Electronic Information and Communication Technology (CECIT), pp. 359\u2013366 (2022)","DOI":"10.1109\/CECIT58139.2022.00069"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Hall, A.J., Pitropakis, N., Buchanan, W.J., Moradpoor, N.: Predicting malicious insider threat scenarios using organizational data and a heterogeneous stack-classifier. In: 2018 IEEE International Conference on Big Data Big Data, pp. 5034\u20135039 (2018)","DOI":"10.1109\/BigData.2018.8621922"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"He, W., Wu, X., Wu, J., Xie, X., Qiu, L., Sun, L.: Insider threat detection based on user historical behavior and attention mechanism. In: 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC), pp. 564\u2013569 (2021)","DOI":"10.1109\/DSC53577.2021.00089"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Huang, W., Zhu, H., Li, C., Lv, Q., Wang, Y., Yang, H.: ITDBERT: temporal-semantic Representation for Insider Threat Detection. In: 2021 IEEE Symposium on Computers and Communications (ISCC), pp.\u00a01\u20137 (2021)","DOI":"10.1109\/ISCC53001.2021.9631538"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Igbe, O., Saadawi, T.: Insider threat detection using an artificial immune system algorithm. In: 2018 9th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 297\u2013302 (2018)","DOI":"10.1109\/UEMCON.2018.8796583"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Jah\u00a0Rizvi, S.K., Javed, K.F., Moazam, M.: CAS - attention based ISO\/IEC 15408-2 compliant continuous audit system for insider threat detection. In: 2023 3rd International Conference on Artificial Intelligence (ICAI), pp. 153\u2013157 (2023)","DOI":"10.1109\/ICAI58407.2023.10136657"},{"issue":"1","key":"2_CR11","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TNSM.2020.2967721","volume":"17","author":"DC Le","year":"2020","unstructured":"Le, D.C., Zincir-Heywood, N., Heywood, M.I.: Analyzing data granularity levels for insider threat detection using machine learning. IEEE Trans. Netw. Serv. Manag. 17(1), 30\u201344 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Lin, L., Zhong, S., Jia, C., Chen, K.: Insider threat detection based on deep belief network feature representation. In: 2017 International Conference on Green Informatics (ICGI), pp. 54\u201359 (2017)","DOI":"10.1109\/ICGI.2017.37"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Liu, A., Du, X., Wang, N.: Recognition of access control role based on convolutional neural network. In: 2018 IEEE 4th International Conference on Computer and Communications (ICCC), pp. 2069\u20132074 (2018)","DOI":"10.1109\/CompComm.2018.8780610"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Mamidanna, S.K., Reddy, C.R.K., Gujju, A.: Detecting an insider threat and analysis of XGBoost using hyperparameter tuning. In: 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), pp. 1\u201310 (2022)","DOI":"10.1109\/ACCAI53970.2022.9752509"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"46561","DOI":"10.1109\/ACCESS.2023.3273895","volume":"11","author":"M Mehmood","year":"2023","unstructured":"Mehmood, M., Amin, R., Muslam, M.M.A., Xie, J., Aldabbas, H.: Privilege escalation attack detection and mitigation in cloud using machine learning. IEEE Access 11, 46561\u201346576 (2023)","journal-title":"IEEE Access"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Meng, F., Lou, F., Fu, Y., Tian, Z.: Deep learning based attribute classification insider threat detection for data security. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), pp. 576\u2013581 (2018)","DOI":"10.1109\/DSC.2018.00092"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Meng, F., Lu, P., Li, J., Hu, T., Yin, M., Lou, F.: GRU and multi-autoencoder based insider threat detection for cyber security. In: 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC), pp. 203\u2013210 (2021)","DOI":"10.1109\/DSC53577.2021.00035"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Mittal, A., Garg, U.: Design and analysis of insider threat detection and prediction system using machine learning techniques. In: 2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp.\u00a01\u20138 (2023)","DOI":"10.1109\/ICECCT56650.2023.10179686"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Mittal, A., Garg, U.: Prediction and detection of insider threat detection using emails: a comparision. In: 2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT), pp. 1\u20136 (2023)","DOI":"10.1109\/ICEEICT56924.2023.10157297"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"143266","DOI":"10.1109\/ACCESS.2021.3118297","volume":"9","author":"R Nasir","year":"2021","unstructured":"Nasir, R., Afzal, M., Latif, R., Iqbal, W.: Behavioral based insider threat detection using deep learning. IEEE Access 9, 143266\u2013143274 (2021)","journal-title":"IEEE Access"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Orizio, R., Vuppala, S., Basagiannis, S., Provan, G.: Towards an explainable approach for insider threat detection: constraint network learning. In: 2020 International Conference on Intelligent Data Science Technologies and Applications (IDSTA), pp. 42\u201349 (2020)","DOI":"10.1109\/IDSTA50958.2020.9264049"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Pantelidis, E., Bendiab, G., Shiaeles, S., Kolokotronis, N.: Insider threat detection using deep autoencoder and variational autoencoder neural networks. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 129\u2013134 (2021)","DOI":"10.1109\/CSR51186.2021.9527925"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Saaudi, A., Al-Ibadi, Z., Tong, Y., Farkas, C.: Insider threats detection using CNN-LSTM model. In: 2018 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 94\u201399 (2018)","DOI":"10.1109\/CSCI46756.2018.00025"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Shashanka, M., Shen, M.Y., Wang, J.: User and entity behavior analytics for enterprise security. In: 2016 IEEE International Conference Big Data Big Data, Washington DC, USA, pp. 1867\u20131874. IEEE (2016)","DOI":"10.1109\/BigData.2016.7840805"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Singh, M., Mehtre, BM., Sangeetha, S.: User behaviour based insider threat detection in critical infrastructures. In: 2021 2nd International Conference on Secure Cyber Computing and Communication (ICSCCC), pp. 489\u2013494 (2021)","DOI":"10.1109\/ICSCCC51823.2021.9478137"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Sun, D., Liu, M., Li, M., Shi, Z., Liu, P., Wang, X.: DeepMIT: a novel malicious insider threat detection framework based on recurrent neural network. In: 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 335\u2013341 (2021)","DOI":"10.1109\/CSCWD49262.2021.9437887"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Sun, X., Wang, Y., Shi, Z.: Insider threat detection using an unsupervised learning method: COPOD. In: 2021 International Conference on Communications, Information System and Computer Engineering (CISCE), pp. 749\u2013754 (2021)","DOI":"10.1109\/CISCE52179.2021.9445898"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Tang, B., Hu, Q., Lin, D.: Reducing false positives of user-to-entity first-access alerts for user behavior analytics. In: 2017 IEEE International Conference on Data Mining Workshops (ICDMW), pp. 804\u2013811 (2017)","DOI":"10.1109\/ICDMW.2017.111"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Varsha\u00a0Suresh, P., Lalitha\u00a0Madhavu, M.: Insider attack: internal cyber attack detection using machine learning. In: 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kharagpur, India, pp.\u00a01\u20137. IEEE (2021)","DOI":"10.1109\/ICCCNT51525.2021.9579549"}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-7244-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T17:03:42Z","timestamp":1724778222000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-7244-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819772438","9789819772445"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-7244-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"28 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APWeb-WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jinhua","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apwebwaim2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/apweb2024.zjnu.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}