{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T02:00:37Z","timestamp":1776045637022,"version":"3.50.1"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/tcss.2018.2857473","type":"journal-article","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T19:05:09Z","timestamp":1535051109000},"page":"660-675","source":"Crossref","is-referenced-by-count":96,"title":["Scenario-Based Insider Threat Detection From Cyber Activities"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5805-6563","authenticated-orcid":false,"given":"Pratik","family":"Chattopadhyay","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4257-7639","authenticated-orcid":false,"given":"Lipo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yap-Peng","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"35","article-title":"Clustering-based subset ensemble learning method for imbalanced data","author":"hu","year":"2013","journal-title":"Proc Int Conf Mach Learn Cybern"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1024691352"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312220"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1613\/jair.120"},{"key":"ref31","first-page":"445","article-title":"Cost-sensitive learning with neural networks","author":"kukar","year":"1998","journal-title":"Proc 13th Eur Conf Artif Intell"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2009.03.002"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/978-3-540-76280-5_14","article-title":"Review of classifier combination methods","author":"tulyakov","year":"2008","journal-title":"Machine Learning in Document Analysis and Recognition"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45014-9_1"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/978-3-540-85836-2_27","article-title":"Selective pre-processing of imbalanced data for improving classification performance","author":"stefanowski","year":"2008","journal-title":"Proc Int Conf on Data Warehousing and Knowledge Discovery"},{"key":"ref34","first-page":"1","article-title":"C4.5, class imbalance, and cost sensitivity: Why under-sampling beats over-sampling","author":"drummond","year":"2003","journal-title":"Proc Int Conf Mach Learning Workshop Learning Imbalanced Data Sets"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.091"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3940(97)00192-4"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1108\/00330330610681295"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2007.12.023"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2029559"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref27","first-page":"107","article-title":"SMOTEBoost: Improving prediction of the minority class in boosting","author":"chawla","year":"2003","journal-title":"Proc of Conf on Knowledge Discovery in Data"},{"key":"ref65","first-page":"81","author":"mitchell","year":"1997","journal-title":"Machine Learning"},{"key":"ref66","first-page":"625","article-title":"Why does unsupervised pre-training help deep learning?","volume":"11","author":"erhan","year":"2010","journal-title":"J Mach Learn Res"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2010.2042721"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.21236\/ADA589594","article-title":"A preliminary model of insider theft of intellectual property","author":"moore","year":"2011"},{"key":"ref1","author":"team","year":"2016","journal-title":"2016 Cyber Security Intelligence Index"},{"key":"ref20","first-page":"445","article-title":"Introducing cost-sensitive neural networks","author":"wan","year":"1999","journal-title":"Proc Int Conf Info Commun Signal Process"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25465-X_40"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.17"},{"key":"ref24","first-page":"1","article-title":"Cost sensitive classification in data mining","author":"qin","year":"2010","journal-title":"Proc 6th Int Conf Adv Data Mining Appl"},{"key":"ref23","first-page":"111","article-title":"The class imbalance problem: Significance and strategies","author":"japkowicz","year":"2000","journal-title":"Proc Int Conf Artif Intell Special Track Inductive Learn"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2009.756"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref50","first-page":"1","article-title":"Frequency domain method for analysis of macroeconomic time series","author":"zhu","year":"2010","journal-title":"Proc Int Conf Multimedia Technol"},{"key":"ref51","first-page":"310","article-title":"Wavelet packet multi-layer perceptron for chaotic time series prediction: Effects of weight initialization","author":"teo","year":"2001","journal-title":"Proc Int Conf Comput Sci"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213004001466"},{"key":"ref58","author":"chatfield","year":"2016","journal-title":"The Analysis of Time Series An Introduction"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.103"},{"key":"ref56","author":"wang","year":"2006","journal-title":"Data Mining with Computational Intelligence"},{"key":"ref55","first-page":"339","article-title":"Fractal dimension of electroencephalographic time series and underlying brain processes","volume":"73","author":"lutzenberger","year":"1997","journal-title":"Biol Cybern"},{"key":"ref54","first-page":"2","article-title":"F4: Large-scale automated forecasting using fractals","author":"chakrabarti","year":"2002","journal-title":"Proc Int Conf Inf Knowl Manage"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379788"},{"key":"ref52","first-page":"1593","article-title":"Predicting time series with wavelet packet neural networks","author":"wang","year":"2001","journal-title":"Proc IEEE Int Joint Conf Neural Netw"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2014.38"},{"key":"ref11","first-page":"146","article-title":"ELICIT: A system for detecting insiders who violate need-to-know","author":"maloof","year":"2007","journal-title":"Proc Int Workshop Adv GPR"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00078-5"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/978-981-10-0135-2_34","article-title":"An insider cyber threat prediction mechanism based on behavioral analysis","author":"bhavsar","year":"2016","journal-title":"Proc Int Conf ICT Sustain Develop"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77322-3_2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00109-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2014.2377811"},{"key":"ref16","first-page":"277","article-title":"Detecting unknown insider threat scenarios","author":"young","year":"2014","journal-title":"Proc Secur Privacy Workshops"},{"key":"ref17","first-page":"26","article-title":"An insider threat prediction model","author":"kandias","year":"2010","journal-title":"Proc IEEE Symp Privacy Secur"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.14"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2016.2568538"},{"key":"ref4","first-page":"44","article-title":"Context-aware insider threat detection","author":"memory","year":"2013","journal-title":"Proc Workshop Activity Context Syst Archit"},{"key":"ref3","first-page":"3716","article-title":"Validating common characteristics of malicious insiders: Proof of concept study","author":"liang","year":"2016","journal-title":"Proc 49th Hawaii Int Conf Syst Sci"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488213"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.32"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.29"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2808783.2808784"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jeconom.2014.09.010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2015.7446229"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-013-0322-1"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339579"},{"key":"ref48","first-page":"259","article-title":"Mining minimal distinguishing subsequence patterns with gap constraints","author":"ji","year":"2005","journal-title":"Proc 5th IEEE Int Conf Data Mining"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-010-0179-5"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.09.022"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.01.025"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2426723"},{"key":"ref43","article-title":"Lower-bounding of dynamic time warping distances for multivariate time series","author":"rath","year":"2003"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/8464016\/08444978.pdf?arnumber=8444978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T09:34:13Z","timestamp":1643189653000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8444978\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":67,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2018.2857473","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"value":"2329-924X","type":"electronic"},{"value":"2373-7476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}