{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:30:24Z","timestamp":1774449024254,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T00:00:00Z","timestamp":1703721600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T00:00:00Z","timestamp":1703721600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s11235-023-01085-3","type":"journal-article","created":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T05:03:58Z","timestamp":1703739838000},"page":"899-915","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Insider threat detection using supervised machine learning algorithms"],"prefix":"10.1007","volume":"87","author":[{"given":"Phavithra","family":"Manoharan","sequence":"first","affiliation":[]},{"given":"Jiao","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yanchun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wenjie","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,28]]},"reference":[{"key":"1085_CR1","doi-asserted-by":"crossref","unstructured":"Hong, W., Yin, J., You, M., Wang, H., Cao, J., Li, J., & Liu, M. (2022). Graph intelligence enhanced bi-channel insider threat detection. In: Network and system security: 16th International conference, NSS 2022, Denarau Island, Fiji, December 9\u201312, 2022, proceedings (pp. 86\u2013102). Springer.","DOI":"10.1007\/978-3-031-23020-2_5"},{"issue":"1","key":"1085_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/JAS.2022.105860","volume":"10","author":"X Feng","year":"2022","unstructured":"Feng, X., Zhu, X., Han, Q.-L., Zhou, W., Wen, S., & Xiang, Y. (2022). Detecting vulnerability on iot device firmware: A survey. IEEE\/CAA Journal of Automatica Sinica, 10(1), 25\u201341.","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"issue":"3","key":"1085_CR3","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/JAS.2021.1004261","volume":"9","author":"J Zhang","year":"2021","unstructured":"Zhang, J., Pan, L., Han, Q.-L., Chen, C., Wen, S., & Xiang, Y. (2021). Deep learning based attack detection for cyber-physical system cybersecurity: A survey. IEEE\/CAA Journal of Automatica Sinica, 9(3), 377\u2013391.","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"issue":"2","key":"1085_CR4","doi-asserted-by":"publisher","first-page":"1744","DOI":"10.1109\/COMST.2018.2885561","volume":"21","author":"N Sun","year":"2018","unstructured":"Sun, N., Zhang, J., Rimba, P., Gao, S., Zhang, L. Y., & Xiang, Y. (2018). Data-driven cybersecurity incident prediction: A survey. IEEE Communications Surveys and Tutorials, 21(2), 1744\u20131772.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"10","key":"1085_CR5","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/JPROC.2020.2993293","volume":"108","author":"G Lin","year":"2020","unstructured":"Lin, G., Wen, S., Han, Q.-L., Zhang, J., & Xiang, Y. (2020). Software vulnerability detection using deep neural networks: a survey. Proceedings of the IEEE, 108(10), 1825\u20131848.","journal-title":"Proceedings of the IEEE"},{"key":"1085_CR6","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1109\/TIFS.2019.2932228","volume":"15","author":"X Chen","year":"2019","unstructured":"Chen, X., Li, C., Wang, D., Wen, S., Zhang, J., Nepal, S., Xiang, Y., & Ren, K. (2019). Android hiv: A study of repackaging malware for evading machine-learning detection. IEEE Transactions on Information Forensics and Security, 15, 987\u20131001.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"1085_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3417978","volume":"53","author":"J Qiu","year":"2020","unstructured":"Qiu, J., Zhang, J., Luo, W., Pan, L., Nepal, S., & Xiang, Y. (2020). A survey of android malware detection with deep neural models. ACM Computing Surveys (CSUR), 53(6), 1\u201336.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"1085_CR8","doi-asserted-by":"crossref","unstructured":"Le, D. C., Zincir-Heywood, A. N., & Heywood, M. I. (2019). Dynamic insider threat detection based on adaptable genetic programming. In 2019 IEEE symposium series on computational Intelligence (SSCI) (pp. 2579\u20132586). IEEE.","DOI":"10.1109\/SSCI44817.2019.9003134"},{"key":"1085_CR9","doi-asserted-by":"crossref","unstructured":"You, M., Yin, J., Wang, H., Cao, J., Wang, K., Miao, Y., & Bertino, E. (2022). A knowledge graph empowered online learning framework for access control decision-making. World Wide Web, 1\u201322.","DOI":"10.1007\/s11280-022-01076-5"},{"key":"1085_CR10","doi-asserted-by":"crossref","unstructured":"Yin, J., Tang, M., Cao, J., You, M., Wang, H., & Alazab, M. (2022). Knowledge-driven cybersecurity intelligence: Software vulnerability co-exploitation behaviour discovery. IEEE Transactions on Industrial Informatics.","DOI":"10.1109\/TII.2022.3192027"},{"issue":"3","key":"1085_CR11","first-page":"508","volume":"24","author":"T Huang","year":"2019","unstructured":"Huang, T., Gong, Y.-J., Kwong, S., Wang, H., & Zhang, J. (2019). A niching memetic algorithm for multi-solution traveling salesman problem. IEEE Transactions on Evolutionary Computation, 24(3), 508\u2013522.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"1085_CR12","doi-asserted-by":"crossref","unstructured":"Wang, H., & Sun, L. (2010). Trust-involved access control in collaborative open social networks. In 2010 Fourth international conference on network and system security (pp. 239\u2013246). IEEE.","DOI":"10.1109\/NSS.2010.13"},{"key":"1085_CR13","doi-asserted-by":"crossref","unstructured":"Rao, R. S., Umarekar, A., Pais, & A. R. (2022). Application of word embedding and machine learning in detecting phishing websites. Telecommunication Systems, 1\u201313.","DOI":"10.1007\/s11235-021-00850-6"},{"key":"1085_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100500","volume":"46","author":"X Hu","year":"2022","unstructured":"Hu, X., Ma, W., Chen, C., Wen, S., Zhang, J., Xiang, Y., & Fei, G. (2022). Event detection in online social network: Methodologies, state-of-art, and evolution. Computer Science Review, 46, 100500.","journal-title":"Computer Science Review"},{"issue":"11s","key":"1085_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3512345","volume":"54","author":"X Zhu","year":"2022","unstructured":"Zhu, X., Wen, S., Camtepe, S., & Xiang, Y. (2022). Fuzzing: A survey for roadmap. ACM Computing Surveys (CSUR), 54(11s), 1\u201336.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"1","key":"1085_CR16","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11235-022-00957-4","volume":"82","author":"H Kavusi","year":"2023","unstructured":"Kavusi, H., Maghooli, K., & Haghipour, S. (2023). A novel and smarter model to authenticate and identify people intelligently for security purposes. Telecommunication Systems, 82(1), 27\u201343.","journal-title":"Telecommunication Systems"},{"key":"1085_CR17","doi-asserted-by":"publisher","first-page":"5039","DOI":"10.32604\/cmc.2022.019289","volume":"71","author":"M Humayun","year":"2022","unstructured":"Humayun, M., Jhanjhi, N., Almufareh, M. F., & Khalil, M. I. (2022). Security threat and vulnerability assessment and measurement in secure software development. Computers, Materials and Continua, 71, 5039\u20135059.","journal-title":"Computers, Materials and Continua"},{"key":"1085_CR18","doi-asserted-by":"crossref","unstructured":"Sun, X., Wang, H., & Li, J. (2009). Injecting purpose and trust into data anonymisation. In Proceedings of the 18th ACM conference on information and knowledge management (pp. 1541\u20131544).","DOI":"10.1145\/1645953.1646166"},{"issue":"3","key":"1085_CR19","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1002\/cpe.3286","volume":"28","author":"H Wang","year":"2016","unstructured":"Wang, H., Yi, X., Bertino, E., & Sun, L. (2016). Protecting outsourced data in cloud computing through access management. Concurrency and Computation: Practice and Experience, 28(3), 600\u2013615.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"1085_CR20","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1007\/s11280-019-00704-x","volume":"23","author":"H Wang","year":"2020","unstructured":"Wang, H., Wang, Y., Taleb, T., & Jiang, X. (2020). Special issue on security and privacy in network computing. World Wide Web, 23, 951\u2013957.","journal-title":"World Wide Web"},{"key":"1085_CR21","doi-asserted-by":"crossref","unstructured":"Phruksahiran, N. (2023). Improvement of source localization via cellular network using machine learning approach. Telecommunication Systems, 1\u20139.","DOI":"10.1007\/s11235-022-00986-z"},{"issue":"2","key":"1085_CR22","first-page":"136","volume":"19","author":"S Kok","year":"2019","unstructured":"Kok, S., Abdullah, A., Jhanjhi, N., & Supramaniam, M. (2019). Ransomware, threat and detection techniques: A review. International Journal of Computer Science and Network Security, 19(2), 136.","journal-title":"International Journal of Computer Science and Network Security"},{"issue":"4","key":"1085_CR23","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1093\/comjnl\/bxr028","volume":"55","author":"X Sun","year":"2012","unstructured":"Sun, X., Wang, H., Li, J., & Zhang, Y. (2012). Satisfying privacy requirements before data anonymization. The Computer Journal, 55(4), 422\u2013437.","journal-title":"The Computer Journal"},{"issue":"6","key":"1085_CR24","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1109\/TSMCA.2003.819917","volume":"33","author":"H Wang","year":"2003","unstructured":"Wang, H., Zhang, Y., Cao, J., & Varadharajan, V. (2003). Achieving secure and flexible m-services through tickets. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 33(6), 697\u2013708.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans"},{"key":"1085_CR25","doi-asserted-by":"crossref","unstructured":"You, M., Yin, J., Wang, H., Cao, J., Miao, Y. (2021). A minority class boosted framework for adaptive access control decision-making. In International conference on web information systems engineering (pp. 143\u2013157). Springer.","DOI":"10.1007\/978-3-030-90888-1_12"},{"key":"1085_CR26","unstructured":"Sun, X., Li, M., Wang, H., & Plank, A. (2008). An efficient hash-based algorithm for minimal k-anonymity. In Conferences in research and practice in information technology (CRPIT) (Vol. 74, pp. 101\u2013107)."},{"key":"1085_CR27","unstructured":"Brackney, R. C., & Anderson, R. H. (2004). Understanding the insider threat. In Proceedings of a march 2004 workshop. Technical report, RAND CORP SANTA MONICA CA."},{"key":"1085_CR28","doi-asserted-by":"publisher","first-page":"78847","DOI":"10.1109\/ACCESS.2020.2990195","volume":"8","author":"A Kim","year":"2020","unstructured":"Kim, A., Oh, J., Ryu, J., & Lee, K. (2020). A review of insider threat detection approaches with iot perspective. IEEE Access, 8, 78847\u201378867.","journal-title":"IEEE Access"},{"issue":"3","key":"1085_CR29","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.future.2010.07.007","volume":"27","author":"X Sun","year":"2011","unstructured":"Sun, X., Li, M., & Wang, H. (2011). A family of enhanced (l, $$\\alpha $$)-diversity models for privacy preserving data publishing. Future Generation Computer Systems, 27(3), 348\u2013356.","journal-title":"Future Generation Computer Systems"},{"key":"1085_CR30","unstructured":"Kabir, M. E., & Wang, H. (2009). Conditional purpose based access control model for privacy protection. In Proceedings of the twentieth australasian conference on australasian database (Vol. 92, pp. 135\u2013142)."},{"key":"1085_CR31","doi-asserted-by":"crossref","unstructured":"Wang, H., Cao, J., & Zhang, Y. (2020). Building access control policy model for privacy preserving and testing policy conflicting problems. Access Control Management in Cloud Environments, 225\u2013247.","DOI":"10.1007\/978-3-030-31729-4_11"},{"key":"1085_CR32","doi-asserted-by":"crossref","unstructured":"Salem, M. B., & Stolfo, S. J. (2011). Modeling user search behavior for masquerade detection. In International workshop on recent advances in intrusion detection (pp. 181\u2013200). Springer.","DOI":"10.1007\/978-3-642-23644-0_10"},{"key":"1085_CR33","doi-asserted-by":"crossref","unstructured":"Salem, M. B., & Stolfo, S. J. (2011). Modeling user search behavior for masquerade detection. In International workshop on recent advances in intrusion detection (pp. 181\u2013200). Springer.","DOI":"10.1007\/978-3-642-23644-0_10"},{"key":"1085_CR34","doi-asserted-by":"crossref","unstructured":"Schonlau, M., DuMouchel, W., Ju, W.-H., Karr, A. F., Theus, M., & Vardi, Y. (2001). Computer intrusion: Detecting masquerades. Statistical Science, 58\u201374.","DOI":"10.1214\/ss\/998929476"},{"key":"1085_CR35","doi-asserted-by":"publisher","unstructured":"Greenberg, S. (1988). Using UNIX: Collected traces of 168 users. PRISM. https:\/\/doi.org\/10.11575\/PRISM\/10182, https:\/\/prism.ucalgary.ca\/handle\/1880\/45929","DOI":"10.11575\/PRISM\/10182"},{"key":"1085_CR36","doi-asserted-by":"crossref","unstructured":"Harilal, A., Toffalini, F., Castellanos, J., Guarnizo, J., Homoliak, I., & Ochoa, M. (2017). Twos: A dataset of malicious insider threat behavior based on a gamified competition. In Proceedings of the 2017 international workshop on managing insider security threats (pp. 45\u201356).","DOI":"10.1145\/3139923.3139929"},{"key":"1085_CR37","doi-asserted-by":"crossref","unstructured":"Yin, J., Tang, M., Cao, J., You, M., & Wang, H. (2022). Cybersecurity applications in software: Data-driven software vulnerability assessment and management. In Emerging trends in cybersecurity applications (pp. 371\u2013389). Springer.","DOI":"10.1007\/978-3-031-09640-2_17"},{"issue":"2","key":"1085_CR38","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1109\/COMST.2018.2800740","volume":"20","author":"L Liu","year":"2018","unstructured":"Liu, L., De Vel, O., Han, Q.-L., Zhang, J., & Xiang, Y. (2018). Detecting and preventing cyber insider threats: A survey. IEEE Communications Surveys and Tutorials, 20(2), 1397\u20131417. https:\/\/doi.org\/10.1109\/COMST.2018.2800740","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"1085_CR39","doi-asserted-by":"crossref","unstructured":"Jiang, J., Chen, J., Choo, K.-K. R., Liu, K., Liu, C., Yu, M., & Mohapatra, P. (2018). Prediction and detection of malicious insiders\u2019 motivation based on sentiment profile on webpages and emails. In MILCOM 2018-2018 IEEE military communications conference (MILCOM) (pp. 1\u20136). IEEE.","DOI":"10.1109\/MILCOM.2018.8599790"},{"key":"1085_CR40","doi-asserted-by":"crossref","unstructured":"Le, T., Phung, D., Nguyen, K., & Venkatesh, S. (2015). Fast one-class support vector machine for novelty detection. In Pacific-Asia conference on knowledge discovery and data mining (pp. 189\u2013200). Springer.","DOI":"10.1007\/978-3-319-18032-8_15"},{"key":"1085_CR41","doi-asserted-by":"crossref","unstructured":"Rashid, T., Agrafiotis, I., & Nurse, J. R. (2016). A new take on detecting insider threats: Exploring the use of hidden Markov models. In Proceedings of the 8th ACM CCS international workshop on managing insider security threats (pp. 47\u201356).","DOI":"10.1145\/2995959.2995964"},{"issue":"1","key":"1085_CR42","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TNSM.2020.2967721","volume":"17","author":"DC Le","year":"2020","unstructured":"Le, D. C., Zincir-Heywood, N., & Heywood, M. I. (2020). Analyzing data granularity levels for insider threat detection using machine learning. IEEE Transactions on Network and Service Management, 17(1), 30\u201344.","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"1085_CR43","doi-asserted-by":"crossref","unstructured":"Gamachchi, A., & Boztas, S. (2017). Insider threat detection through attributed graph clustering. In 2017 IEEE Trustcom\/BigDataSE\/ICESS (pp. 112\u2013119). IEEE.","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.227"},{"key":"1085_CR44","doi-asserted-by":"crossref","unstructured":"Gamachchi, A., Sun, L., & Boztas, S. (2018). A graph based framework for malicious insider threat detection. arXiv:1809.00141","DOI":"10.24251\/HICSS.2017.319"},{"key":"1085_CR45","doi-asserted-by":"crossref","unstructured":"Le, D. C., & Zincir-Heywood, A. N. (2018). Evaluating insider threat detection workflow using supervised and unsupervised learning. In 2018 IEEE security and privacy workshops (SPW) (pp. 270\u2013275). IEEE.","DOI":"10.1109\/SPW.2018.00043"},{"key":"1085_CR46","doi-asserted-by":"crossref","unstructured":"Paul, S., & Mishra, S. (2020). Lac: Lstm autoencoder with community for insider threat detection. In 2020 the 4th International conference on big data research (ICBDR\u201920) (pp. 71\u201377).","DOI":"10.1145\/3445945.3445958"},{"key":"1085_CR47","doi-asserted-by":"publisher","first-page":"143266","DOI":"10.1109\/ACCESS.2021.3118297","volume":"9","author":"R Nasir","year":"2021","unstructured":"Nasir, R., Afzal, M., Latif, R., & Iqbal, W. (2021). Behavioral based insider threat detection using deep learning. IEEE Access, 9, 143266\u2013143274. https:\/\/doi.org\/10.1109\/ACCESS.2021.3118297","journal-title":"IEEE Access"},{"key":"1085_CR48","unstructured":"Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., & Robinson, S. (2017). Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. arXiv:1710.00811"},{"key":"1085_CR49","doi-asserted-by":"crossref","unstructured":"Lu, J., & Wong, R. K. (2019). Insider threat detection with long short-term memory. In: Proceedings of the australasian computer science week multiconference (pp. 1\u201310).","DOI":"10.1145\/3290688.3290692"},{"key":"1085_CR50","doi-asserted-by":"crossref","unstructured":"Saaudi, A., Al-Ibadi, Z., Tong, Y., & Farkas, C. (2018). Insider threats detection using cnn-lstm model. In 2018 International conference on computational science and computational intelligence (CSCI) (pp. 94\u201399). IEEE.","DOI":"10.1109\/CSCI46756.2018.00025"},{"key":"1085_CR51","doi-asserted-by":"crossref","unstructured":"Jiang, J., Chen, J., Gu, T., Choo, K.-K. R., Liu, C., Yu, M., Huang, W., & Mohapatra, P. (2019). Anomaly detection with graph convolutional networks for insider threat and fraud detection. In MILCOM 2019\u20132019 IEEE military communications conference (MILCOM) (pp. 109\u2013114). IEEE.","DOI":"10.1109\/MILCOM47813.2019.9020760"},{"key":"1085_CR52","doi-asserted-by":"crossref","unstructured":"Glasser, J., & Lindauer, B. (2013). Bridging the gap: A pragmatic approach to generating insider threat data. In 2013 IEEE security and privacy workshops (pp. 98\u2013104). IEEE.","DOI":"10.1109\/SPW.2013.37"},{"key":"1085_CR53","doi-asserted-by":"crossref","unstructured":"Chen, T., & Guestrin, C. (2016) Xgboost: A scalable tree boosting system. In Proceedings of the 22nd Acm Sigkdd international conference on knowledge discovery and data mining (pp. 785\u2013794).","DOI":"10.1145\/2939672.2939785"},{"issue":"3","key":"1085_CR54","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/TBDATA.2016.2599928","volume":"4","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Shen, Y., Wang, H., Cao, J., & Jiang, X. (2016). Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications. IEEE Transactions on Big Data, 4(3), 418\u2013431.","journal-title":"IEEE Transactions on Big Data"},{"key":"1085_CR55","doi-asserted-by":"publisher","first-page":"2957","DOI":"10.1007\/s11280-020-00813-y","volume":"23","author":"F Zhang","year":"2020","unstructured":"Zhang, F., Wang, Y., Liu, S., & Wang, H. (2020). Decision-based evasion attacks on tree ensemble classifiers. World Wide Web, 23, 2957\u20132977.","journal-title":"World Wide Web"},{"key":"1085_CR56","doi-asserted-by":"crossref","unstructured":"Yin, J., You, M., Cao, J., Wang, H., Tang, M., & Ge, Y.-F. (2020). Data-driven hierarchical neural network modeling for high-pressure feedwater heater group. In Australasian database conference (pp. 225\u2013233). Springer.","DOI":"10.1007\/978-3-030-39469-1_19"},{"issue":"1","key":"1085_CR57","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/s13755-023-00212-3","volume":"11","author":"Y Chen","year":"2023","unstructured":"Chen, Y., Han, S., Chen, G., Yin, J., Wang, K. N., & Cao, J. (2023). A deep reinforcement learning-based wireless body area network offloading optimization strategy for healthcare services. Health Information Science and Systems, 11(1), 8.","journal-title":"Health Information Science and Systems"},{"key":"1085_CR58","doi-asserted-by":"crossref","unstructured":"Yuan, F., Cao, Y., Shang, Y., Liu, Y., Tan, J., & Fang, B. (2018). Insider threat detection with deep neural network. In Computational science\u2013ICCS 2018: 18th international conference, Wuxi, China, June 11\u201313, 2018, proceedings, Part I 18 (pp. 43\u201354). Springer.","DOI":"10.1007\/978-3-319-93698-7_4"},{"key":"1085_CR59","doi-asserted-by":"crossref","unstructured":"Lin, L., Zhong, S., Jia, C., & Chen, K. (2017). Insider threat detection based on deep belief network feature representation. In 2017 International conference on green informatics (ICGI) (pp. 54\u201359). IEEE.","DOI":"10.1109\/ICGI.2017.37"},{"key":"1085_CR60","doi-asserted-by":"crossref","unstructured":"Sharma, B., Pokharel, P., & Joshi, B. (2020). User behavior analytics for anomaly detection using lstm autoencoder-insider threat detection. In Proceedings of the 11th international conference on advances in information technology (pp. 1\u20139).","DOI":"10.1145\/3406601.3406610"},{"key":"1085_CR61","doi-asserted-by":"crossref","unstructured":"Singh, M., Mehtre, B., & Sangeetha, S. (2020). Insider threat detection based on user behaviour analysis. In Machine learning, image processing, network security and data sciences: Second international conference, MIND 2020, Silchar, India, July 30\u201331, 2020, proceedings, Part II 2 (pp. 559\u2013574). Springer.","DOI":"10.1007\/978-981-15-6318-8_45"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-023-01085-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-023-01085-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-023-01085-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T05:07:21Z","timestamp":1733548041000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-023-01085-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,28]]},"references-count":61,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["1085"],"URL":"https:\/\/doi.org\/10.1007\/s11235-023-01085-3","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,28]]},"assertion":[{"value":"25 November 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}