{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:12:38Z","timestamp":1770275558112,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819972531","type":"print"},{"value":"9789819972548","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-7254-8_14","type":"book-chapter","created":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T05:01:47Z","timestamp":1697864507000},"page":"179-188","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Bilateral Insider Threat Detection: Harnessing Standalone and\u00a0Sequential Activities with\u00a0Recurrent Neural Networks"],"prefix":"10.1007","author":[{"given":"Phavithra","family":"Manoharan","sequence":"first","affiliation":[]},{"given":"Wei","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Jiao","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Yanchun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wenjie","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Jiangang","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,21]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Al-Mhiqani, M.N., et al.: A new intelligent multilayer framework for insider threat detection. Comput. Electr. Eng. 97, 107597 (2022)","DOI":"10.1016\/j.compeleceng.2021.107597"},{"issue":"2","key":"14_CR2","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1109\/JSYST.2016.2558507","volume":"11","author":"B B\u00f6se","year":"2017","unstructured":"B\u00f6se, B., Avasarala, B., Tirthapura, S., Chung, Y.Y., Steiner, D.: Detecting insider threats using radish: a system for real-time anomaly detection in heterogeneous data streams. IEEE Syst. J. 11(2), 471\u2013482 (2017)","journal-title":"IEEE Syst. J."},{"key":"14_CR3","unstructured":"Deloitte: Impact of COVID-19 on cybersecurity (2023). https:\/\/www2.deloitte.com\/ch\/en\/pages\/risk\/articles\/impact-covid-cybersecurity.html"},{"issue":"6","key":"14_CR4","first-page":"e9","volume":"9","author":"M Fatima","year":"2022","unstructured":"Fatima, M., Rehman, O., Rahman, I.M.: Impact of features reduction on machine learning based intrusion detection systems. EAI Endors. Trans. Scalable Inf. Syst. 9(6), e9 (2022)","journal-title":"EAI Endors. Trans. Scalable Inf. Syst."},{"issue":"5","key":"14_CR5","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1007\/s00778-021-00718-w","volume":"31","author":"YF Ge","year":"2022","unstructured":"Ge, Y.F., Orlowska, M., Cao, J., Wang, H., Zhang, Y.: MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation. VLDB J. 31(5), 957\u2013975 (2022)","journal-title":"VLDB J."},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-031-20891-1_24","volume-title":"Web Information Systems Engineering - WISE 2022","author":"YF Ge","year":"2022","unstructured":"Ge, Y.F., Wang, H., Cao, J., Zhang, Y.: An information-driven genetic algorithm for privacy-preserving data publishing. In: Chbeir, R., Huang, H., Silvestri, F., Manolopoulos, Y., Zhang, Y. (eds.) WISE 2022. LNCS, vol. 13724, pp. 340\u2013354. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20891-1_24"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Glasser, J., Lindauer, B.: Bridging the gap: a pragmatic approach to generating insider threat data. In: 2013 IEEE Security and Privacy Workshops, pp. 98\u2013104. IEEE (2013)","DOI":"10.1109\/SPW.2013.37"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-031-23020-2_5","volume-title":"Network and System Security","author":"W Hong","year":"2022","unstructured":"Hong, W., Yin, J., You, M., Wang, H., Cao, J., Li, J., Liu, M.: Graph intelligence enhanced bi-channel insider threat detection. In: Yuan, X., Bai, G., Alcaraz, C., Majumdar, S. (eds.) NSS 2022. LNCS, vol. 13787, pp. 86\u2013102. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-23020-2_5"},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Hong, W., et al.: A graph empowered insider threat detection framework based on daily activities. ISA Trans. (2023, in press). https:\/\/doi.org\/10.1016\/j.isatra.2023.06.030","DOI":"10.1016\/j.isatra.2023.06.030"},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TNSM.2020.2967721","volume":"17","author":"DC Le","year":"2020","unstructured":"Le, D.C., Zincir-Heywood, N., Heywood, M.I.: Analyzing data granularity levels for insider threat detection using machine learning. IEEE Trans. Netw. Serv. Manage. 17(1), 30\u201344 (2020). https:\/\/doi.org\/10.1109\/TNSM.2020.2967721","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Lu, J., Wong, R.K.: Insider threat detection with long short-term memory. In: Proceedings of the Australasian Computer Science Week Multiconference, pp. 1\u201310 (2019)","DOI":"10.1145\/3290688.3290692"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Meng, F., Lou, F., Fu, Y., Tian, Z.: Deep learning based attribute classification insider threat detection for data security. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), pp. 576\u2013581. IEEE (2018)","DOI":"10.1109\/DSC.2018.00092"},{"issue":"6","key":"14_CR13","first-page":"e6","volume":"9","author":"DR Patil","year":"2022","unstructured":"Patil, D.R., Pattewar, T.M.: Majority voting and feature selection based network intrusion detection system. EAI Endors. Trans. Scalable Inf. Syst. 9(6), e6\u2013e6 (2022)","journal-title":"EAI Endors. Trans. Scalable Inf. Syst."},{"issue":"4","key":"14_CR14","first-page":"e5","volume":"9","author":"R Sarki","year":"2022","unstructured":"Sarki, R., Ahmed, K., Wang, H., Zhang, Y., Wang, K.: Convolutional neural network for multi-class classification of diabetic eye disease. EAI Endors. Trans. Scalable Inf. Syst. 9(4), e5\u2013e5 (2022)","journal-title":"EAI Endors. Trans. Scalable Inf. Syst."},{"issue":"5","key":"14_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4108\/eai.1-2-2022.173294","volume":"9","author":"R Shalini","year":"2022","unstructured":"Shalini, R., Manoharan, R.: Trust model for effective consensus in blockchain. EAI Endors. Trans. Scalable Inf. Syst. 9(5), 1\u20138 (2022). https:\/\/doi.org\/10.4108\/eai.1-2-2022.173294","journal-title":"EAI Endors. Trans. Scalable Inf. Syst."},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Sharma, B., Pokharel, P., Joshi, B.: User behavior analytics for anomaly detection using LSTM autoencoder-insider threat detection. In: Proceedings of the 11th International Conference on Advances in Information Technology, pp. 1\u20139 (2020)","DOI":"10.1145\/3406601.3406610"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Sherstinsky, A.: Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Phys. D 404, 132306 (2020)","DOI":"10.1016\/j.physd.2019.132306"},{"issue":"4","key":"14_CR18","doi-asserted-by":"publisher","first-page":"e17","DOI":"10.4108\/eetsis.v10i3.3184","volume":"10","author":"R Singh","year":"2023","unstructured":"Singh, R., et al.: Antisocial behavior identification from twitter feeds using traditional machine learning algorithms and deep learning. EAI Endors. Trans. Scalable Inf. Syst. 10(4), e17\u2013e17 (2023)","journal-title":"EAI Endors. Trans. Scalable Inf. Syst."},{"issue":"4","key":"14_CR19","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1093\/comjnl\/bxr028","volume":"55","author":"X Sun","year":"2012","unstructured":"Sun, X., Wang, H., Li, J., Zhang, Y.: Satisfying privacy requirements before data anonymization. Comput. J. 55(4), 422\u2013437 (2012). https:\/\/doi.org\/10.1093\/comjnl\/bxr028","journal-title":"Comput. J."},{"key":"14_CR20","unstructured":"Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., Robinson, S.: Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. arXiv preprint arXiv:1710.00811 (2017)"},{"issue":"6","key":"14_CR21","first-page":"e7","volume":"9","author":"N Venkateswaran","year":"2022","unstructured":"Venkateswaran, N., Prabaharan, S.P.: An efficient neuro deep learning intrusion detection system for mobile adhoc networks. EAI Endors. Trans. Scalable Inf. Syst. 9(6), e7 (2022)","journal-title":"EAI Endors. Trans. Scalable Inf. Syst."},{"key":"14_CR22","doi-asserted-by":"publisher","unstructured":"Wang, H., Yi, X., Bertino, E., Sun, L.: Protecting outsourced data in cloud computing through access management. Concurr. Comput.: Pract. Exp. 28 (2014). https:\/\/doi.org\/10.1002\/cpe.3286","DOI":"10.1002\/cpe.3286"},{"key":"14_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-030-62008-0_18","volume-title":"Web Information Systems Engineering \u2013 WISE 2020","author":"J Yin","year":"2020","unstructured":"Yin, J., Tang, M.J., Cao, J., Wang, H., You, M., Lin, Y.: Adaptive online learning for vulnerability exploitation time prediction. In: Huang, Z., Beek, W., Wang, H., Zhou, R., Zhang, Y. (eds.) WISE 2020, Part II. LNCS, vol. 12343, pp. 252\u2013266. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62008-0_18"},{"key":"14_CR24","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-031-09640-2_17","volume-title":"Emerging Trends in Cybersecurity Applications","author":"J Yin","year":"2022","unstructured":"Yin, J., Tang, M., Cao, J., You, M., Wang, H.: Cybersecurity applications in software: data-driven software vulnerability assessment and management. In: Daimi, K., Alsadoon, A., Peoples, C., El Madhoun, N. (eds.) Emerging Trends in Cybersecurity Applications, pp. 371\u2013389. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-09640-2_17"},{"key":"14_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-030-39469-1_19","volume-title":"Databases Theory and Applications","author":"J Yin","year":"2020","unstructured":"Yin, J., You, M., Cao, J., Wang, H., Tang, M.J., Ge, Y.-F.: Data-driven hierarchical neural network modeling for high-pressure feedwater heater group. In: Borovica-Gajic, R., Qi, J., Wang, W. (eds.) ADC 2020. LNCS, vol. 12008, pp. 225\u2013233. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-39469-1_19"},{"key":"14_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-030-90888-1_12","volume-title":"Web Information Systems Engineering \u2013 WISE 2021","author":"M You","year":"2021","unstructured":"You, M., Yin, J., Wang, H., Cao, J., Miao, Y.: A minority class boosted framework for adaptive access control decision-making. In: Zhang, W., Zou, L., Maamar, Z., Chen, L. (eds.) WISE 2021. LNCS, vol. 13080, pp. 143\u2013157. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-90888-1_12"},{"issue":"2","key":"14_CR27","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1007\/s11280-022-01076-5","volume":"26","author":"M You","year":"2023","unstructured":"You, M., et al.: A knowledge graph empowered online learning framework for access control decision-making. World Wide Web 26(2), 827\u2013848 (2023)","journal-title":"World Wide Web"},{"key":"14_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-93698-7_4","volume-title":"Computational Science \u2013 ICCS 2018","author":"F Yuan","year":"2018","unstructured":"Yuan, F., Cao, Y., Shang, Y., Liu, Y., Tan, J., Fang, B.: Insider threat detection with deep neural network. In: Shi, Y., Fu, H., Tian, Y., Krzhizhanovskaya, V.V., Lees, M.H., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2018, Part I. LNCS, vol. 10860, pp. 43\u201354. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93698-7_4"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Yuan, S., Wu, X.: Deep learning for insider threat detection: review, challenges and opportunities. Comput. Secur. 104, 102221 (2021)","DOI":"10.1016\/j.cose.2021.102221"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-7254-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T05:05:36Z","timestamp":1697864736000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-7254-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819972531","9789819972548"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-7254-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"21 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.wise-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"137","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}