{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T15:41:47Z","timestamp":1760370107793,"version":"3.37.3"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1109\/sin63213.2024.10871807","type":"proceedings-article","created":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T18:33:17Z","timestamp":1739471597000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach"],"prefix":"10.1109","author":[{"given":"Rahat","family":"Mehmood","sequence":"first","affiliation":[{"name":"School of Physics, Engineering and Computer Science University of Hertfordshire,Hatfield,United Kingdom"}]},{"given":"Priyanka","family":"Singh","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, The University of Queensland,Brisbane,Australia"}]},{"given":"Zoe","family":"Jeffery","sequence":"additional","affiliation":[{"name":"School of Physics, Engineering and Computer Science University of Hertfordshire,Hatfield,United Kingdom"}]}],"member":"263","reference":[{"volume-title":"Global Data Breaches and Cyber Attacks in 2024","year":"2024","author":"Ford","key":"ref1"},{"key":"ref2","article-title":"Why Data Breaches Spiked in 2023","author":"Madnick","year":"2024","journal-title":"Harvard Business Review"},{"key":"ref3","article-title":"Careless employees behind the majority of in-sider threat incidents","author":"Schwartz","year":"2022","journal-title":"Cybersecurity Dive"},{"key":"ref4","first-page":"30","article-title":"Deep Learning for Insider Threat Detection: Review, Challenges and Oppertunities","author":"Yuan","year":"2021","journal-title":"Science Direct"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/inc457730.2023.10263010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00153"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICGI.2017.37"},{"key":"ref8","first-page":"13","article-title":"Classifier Suites for Insider Threat Detection","author":"Noever","year":"2019","journal-title":"Cornell University"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007592"},{"volume-title":"THREAT HUNTING THROUGH THE USE OF AN ISOLATION FOREST","year":"2018","author":"Devry","key":"ref10"},{"key":"ref11","first-page":"10","article-title":"Detecting Anomalous User Behavior Using an Extended Isolation Forest Algorithm","author":"Sun","year":"2016","journal-title":"arXiv preprint"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4148441"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2019.1582861"},{"volume-title":"Improving the Accuracy of the Intrusion Detection System in the Detection of DoS attack using Ada boosting and comparison with SVM","year":"2023","author":"R","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-023-04581-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3216007"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSURV.2016.7486356"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527925"},{"volume-title":"Unsupervised Neural Networks Explained: What Are They and How Do They Work?","year":"2022","author":"Robin","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.37"},{"key":"ref21","first-page":"8","article-title":"Information Retrieval (Recall and Precision)","author":"Manning","year":"2008","journal-title":"Introduction to Information Retrieval"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2021.3071928"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/app132413021"},{"issue":"5","key":"ref24","doi-asserted-by":"crossref","first-page":"973","DOI":"10.3390\/electronics13050973","article-title":"Insider Threat Detection Model Enhancement Using Hybrid Algorithms between Unsupervised and Supervised Learning","volume":"13","author":"Junkair","year":"2024","journal-title":"Electronics"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-022-00868-7"}],"event":{"name":"2024 17th International Conference on Security of Information and Networks (SIN)","start":{"date-parts":[[2024,12,2]]},"location":"Sydney, Australia","end":{"date-parts":[[2024,12,4]]}},"container-title":["2024 17th International Conference on Security of Information and Networks (SIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10871205\/10871241\/10871807.pdf?arnumber=10871807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T19:48:57Z","timestamp":1740080937000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10871807\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/sin63213.2024.10871807","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]}}}