{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T20:41:17Z","timestamp":1757450477109,"version":"3.37.3"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100010661","name":"European Union's Horizon 2020 research and innovation programme InfraStress","doi-asserted-by":"publisher","award":["833088"],"award-info":[{"award-number":["833088"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1109\/idsta50958.2020.9264049","type":"proceedings-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T21:50:41Z","timestamp":1606773041000},"page":"42-49","source":"Crossref","is-referenced-by-count":10,"title":["Towards an Explainable Approach for Insider Threat Detection: Constraint Network Learning"],"prefix":"10.1109","author":[{"given":"Riccardo","family":"Orizio","sequence":"first","affiliation":[]},{"given":"Satyanarayana","family":"Vuppala","sequence":"additional","affiliation":[]},{"given":"Stylianos","family":"Basagiannis","sequence":"additional","affiliation":[]},{"given":"Gregory","family":"Provan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93698-7_4"},{"key":"ref11","article-title":"Classifier suites for insider threat detection","author":"noever","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2857473"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10925-7_8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00253"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.56.4.586"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.59.4.781"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.ps.41.020190.002221"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-6889-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2011.654318"},{"key":"ref6","article-title":"Deep learning for unsupervised insider threat detection in structured cybersecurity data streams","author":"tuor","year":"0","journal-title":"Workshops at the Thirtieth AAAI Conference on Artificial Intelligence"},{"journal-title":"Deep learning for insider threat detection Review challenges and opportunities","year":"2020","author":"yuan","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00014"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICGI.2017.37"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.37"},{"journal-title":"2019 insider threat survey report","year":"2019","key":"ref1"},{"key":"ref9","article-title":"Image-based feature representation for insider threat classification","author":"sajjanhar","year":"2019","journal-title":"ArXiv Preprint"}],"event":{"name":"2020 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","start":{"date-parts":[[2020,10,19]]},"location":"Valencia, Spain","end":{"date-parts":[[2020,10,22]]}},"container-title":["2020 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9263698\/9264028\/09264049.pdf?arnumber=9264049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:15:22Z","timestamp":1656375322000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9264049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/idsta50958.2020.9264049","relation":{},"subject":[],"published":{"date-parts":[[2020,10,19]]}}}