{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T09:32:04Z","timestamp":1775899924688,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T00:00:00Z","timestamp":1548720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,29]]},"DOI":"10.1145\/3290688.3290692","type":"proceedings-article","created":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T13:15:25Z","timestamp":1547471725000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":53,"title":["Insider Threat Detection with Long Short-Term Memory"],"prefix":"10.1145","author":[{"given":"Jiuming","family":"Lu","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of New South Wales, Sydney, New South Wales"}]},{"given":"Raymond K.","family":"Wong","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of New South Wales, Sydney, New South Wales"}]}],"member":"320","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"265","article-title":"TensorFlow: A System for Large-Scale Machine Learning","volume":"16","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi , Paul Barham , Jianmin Chen , Zhifeng Chen , Andy Davis , Jeffrey Dean , Matthieu Devin , Sanjay Ghemawat , Geoffrey Irving , Michael Isard , 2016 . TensorFlow: A System for Large-Scale Machine Learning .. In OSDI , Vol. 16. 265 -- 283 . Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al. 2016. TensorFlow: A System for Large-Scale Machine Learning.. In OSDI, Vol. 16. 265--283.","journal-title":"OSDI"},{"key":"e_1_3_2_1_2_1","volume-title":"LSTM-Based Memory Profiling for Predicting Data Attacks in Distributed Big Data Systems. In Parallel and Distributed Processing Symposium Workshops (IPDPSW)","author":"Aditham Santosh","year":"2017","unstructured":"Santosh Aditham , Nagarajan Ranganathan , and Srinivas Katkoori . 2017 . LSTM-Based Memory Profiling for Predicting Data Attacks in Distributed Big Data Systems. In Parallel and Distributed Processing Symposium Workshops (IPDPSW) , 2017 IEEE International. IEEE, 1259--1267. Santosh Aditham, Nagarajan Ranganathan, and Srinivas Katkoori. 2017. LSTM-Based Memory Profiling for Predicting Data Attacks in Distributed Big Data Systems. In Parallel and Distributed Processing Symposium Workshops (IPDPSW), 2017 IEEE International. IEEE, 1259--1267."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413158"},{"key":"e_1_3_2_1_4_1","unstructured":"Dawn M Cappelli Andrew P Moore and Randall F Trzeciak. 2012. The CERT guide to insider threats: how to prevent detect and respond to information technology crimes (Theft Sabotage Fraud). Addis on-Wesley.   Dawn M Cappelli Andrew P Moore and Randall F Trzeciak. 2012. The CERT guide to insider threats: how to prevent detect and respond to information technology crimes (Theft Sabotage Fraud). Addis on-Wesley."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.67"},{"key":"e_1_3_2_1_6_1","first-page":"153","article-title":"Big data analytics: A framework for unstructured data analysis","volume":"5","author":"Das TK","year":"2013","unstructured":"TK Das and P Mohan Kumar . 2013 . Big data analytics: A framework for unstructured data analysis . International Journal of Engineering Science & Technology 5 , 1 (2013), 153 . TK Das and P Mohan Kumar. 2013. Big data analytics: A framework for unstructured data analysis. International Journal of Engineering Science & Technology 5, 1 (2013), 153.","journal-title":"International Journal of Engineering Science & Technology"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0103"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/PSCE.2009.4840267"},{"key":"e_1_3_2_1_9_1","volume-title":"Index Report","year":"2017","unstructured":"Gemalto. 2017. Breach Level Index Report 2017 . http:\/\/www.breachlevelindex.com\/ Gemalto. 2017. Breach Level Index Report 2017. http:\/\/www.breachlevelindex.com\/"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Felix A Gers J\u00fcrgen Schmidhuber and Fred Cummins. 1999. Learning to forget: Continual prediction with LSTM. (1999).  Felix A Gers J\u00fcrgen Schmidhuber and Fred Cummins. 1999. Learning to forget: Continual prediction with LSTM. (1999).","DOI":"10.1049\/cp:19991218"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258040"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/773453.808167"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983358"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/5254.708428"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.066"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0036"},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Annual Technical Conference.","author":"Lou Jian-Guang","year":"2010","unstructured":"Jian-Guang Lou , Qiang Fu , Shengqi Yang , Ye Xu , and Jiang Li . 2010 . Mining Invariants from Console Logs for System Problem Detection .. In USENIX Annual Technical Conference. Jian-Guang Lou, Qiang Fu, Shengqi Yang, Ye Xu, and Jiang Li. 2010. Mining Invariants from Console Logs for System Problem Detection.. In USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings. Presses universitaires de Louvain, 89","author":"Malhotra Pankaj","year":"2015","unstructured":"Pankaj Malhotra , Lovekesh Vig , Gautam Shroff , and Puneet Agarwal . 2015 . Long short term memory networks for anomaly detection in time series . In Proceedings. Presses universitaires de Louvain, 89 . Pankaj Malhotra, Lovekesh Vig, Gautam Shroff, and Puneet Agarwal. 2015. Long short term memory networks for anomaly detection in time series. In Proceedings. Presses universitaires de Louvain, 89."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2010-343"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.33"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSURV.2016.7486356"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.14"},{"key":"e_1_3_2_1_26_1","unstructured":"Marisa Reddy Randazzo Michelle Keeney Eileen Kowalski Dawn M Cappelli and Andrew P Moore. 2005. Insider threat study: Illicit cyber activity in the banking and finance sector. (2005).  Marisa Reddy Randazzo Michelle Keeney Eileen Kowalski Dawn M Cappelli and Andrew P Moore. 2005. Insider threat study: Illicit cyber activity in the banking and finance sector. (2005)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2995959.2995964"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113365"},{"key":"e_1_3_2_1_29_1","volume-title":"A survey of decision tree classifier methodology","author":"Rasoul Safavian S","year":"1991","unstructured":"S Rasoul Safavian and David Landgrebe . 1991. A survey of decision tree classifier methodology . IEEE transactions on systems, man, and cybernetics 21, 3 ( 1991 ), 660--674. S Rasoul Safavian and David Landgrebe. 1991. A survey of decision tree classifier methodology. IEEE transactions on systems, man, and cybernetics 21, 3 (1991), 660--674."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Ha\u015fim Sak Andrew Senior and Fran\u00e7oise Beaufays. 2014. Long short-term memory recurrent neural network architectures for large scale acoustic modeling. In Fifteenth annual conference of the international speech communication association.  Ha\u015fim Sak Andrew Senior and Fran\u00e7oise Beaufays. 2014. Long short-term memory recurrent neural network architectures for large scale acoustic modeling. In Fifteenth annual conference of the international speech communication association.","DOI":"10.21437\/Interspeech.2014-80"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.18489\/sacj.v56i1.248"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258494"},{"key":"e_1_3_2_1_35_1","volume-title":"Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. arXiv preprint arXiv:1710.00811","author":"Tuor Aaron","year":"2017","unstructured":"Aaron Tuor , Samuel Kaplan , Brian Hutchinson , Nicole Nichols , and Sean Robinson . 2017. Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. arXiv preprint arXiv:1710.00811 ( 2017 ). Aaron Tuor, Samuel Kaplan, Brian Hutchinson, Nicole Nichols, and Sean Robinson. 2017. Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. arXiv preprint arXiv:1710.00811 (2017)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258163"},{"key":"e_1_3_2_1_37_1","volume-title":"Principal component analysis. Chemometrics and intelligent laboratory systems 2, 1-3","author":"Wold Svante","year":"1987","unstructured":"Svante Wold , Kim Esbensen , and Paul Geladi . 1987. Principal component analysis. Chemometrics and intelligent laboratory systems 2, 1-3 ( 1987 ), 37--52. Svante Wold, Kim Esbensen, and Paul Geladi. 1987. Principal component analysis. Chemometrics and intelligent laboratory systems 2, 1-3 (1987), 37--52."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.19"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523670"},{"key":"e_1_3_2_1_41_1","volume-title":"Insider Threat Detection with Deep Neural Network. In International Conference on Computational Science. Springer, 43--54","author":"Yuan Fangfang","year":"2018","unstructured":"Fangfang Yuan , Yanan Cao , Yanmin Shang , Yanbing Liu , Jianlong Tan , and Binxing Fang . 2018 . Insider Threat Detection with Deep Neural Network. In International Conference on Computational Science. Springer, 43--54 . Fangfang Yuan, Yanan Cao, Yanmin Shang, Yanbing Liu, Jianlong Tan, and Binxing Fang. 2018. Insider Threat Detection with Deep Neural Network. In International Conference on Computational Science. Springer, 43--54."}],"event":{"name":"ACSW 2019: Australasian Computer Science Week 2019","location":"Sydney NSW Australia","acronym":"ACSW 2019","sponsor":["CORE - Computing Research and Education","Macquarie University-Sydney"]},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290688.3290692","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290688.3290692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:17Z","timestamp":1750204397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290688.3290692"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,29]]},"references-count":39,"alternative-id":["10.1145\/3290688.3290692","10.1145\/3290688"],"URL":"https:\/\/doi.org\/10.1145\/3290688.3290692","relation":{},"subject":[],"published":{"date-parts":[[2019,1,29]]},"assertion":[{"value":"2019-01-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}