{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:04:53Z","timestamp":1730210693205,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T00:00:00Z","timestamp":1715126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T00:00:00Z","timestamp":1715126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010880","name":"State Grid Corporation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010880","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012492","name":"Youth Innovation Promotion Association","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012492","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,8]]},"DOI":"10.1109\/cscwd61410.2024.10580430","type":"proceedings-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T17:21:49Z","timestamp":1720632109000},"page":"1578-1584","source":"Crossref","is-referenced-by-count":0,"title":["Deep Dive into Insider Threats: Malicious Activity Detection within Enterprise"],"prefix":"10.1109","author":[{"given":"Haitao","family":"Xiao","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Dan","family":"Du","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Junrong","family":"Liu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Song","family":"Liu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Yan","family":"Zhu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Yuling","family":"Liu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Zhigang","family":"Lu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3303771"},{"article-title":"2023 insider threat report","volume-title":"Gurucul, Tech. Rep.","year":"2023","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102221"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020760"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25538-0_4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2857473"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2967721"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2995959.2995964"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/app10144945"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93698-7_4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0871-4_15"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD49262.2021.9437887"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC53001.2021.9631538"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892183"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363224"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.627"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-022-00561-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1399"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76719-0_53"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2009.5346315"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1144"},{"article-title":"Adversarial training methods for semi-supervised text classification","volume-title":"International Conference on Learning Representations","author":"Miyato","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89363-7_2"},{"journal-title":"Efficient estimation of word representations in vector space","year":"2013","author":"Mikolov","key":"ref25"},{"article-title":"Insider Threat Test Dataset","year":"2020","author":"Lindauer","key":"ref26"},{"key":"ref27","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume":"32","author":"Paszke","year":"2019","journal-title":"Advances in neural information processing systems"}],"event":{"name":"2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2024,5,8]]},"location":"Tianjin, China","end":{"date-parts":[[2024,5,10]]}},"container-title":["2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10579968\/10579982\/10580430.pdf?arnumber=10580430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T05:12:48Z","timestamp":1721279568000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10580430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,8]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cscwd61410.2024.10580430","relation":{},"subject":[],"published":{"date-parts":[[2024,5,8]]}}}