{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:56Z","timestamp":1750219796042,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T00:00:00Z","timestamp":1691020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,3]]},"DOI":"10.1145\/3607947.3608009","type":"proceedings-article","created":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T00:12:21Z","timestamp":1695946341000},"page":"307-312","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Insider Threat Detection: Using Classification Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-3786-3076","authenticated-orcid":false,"given":"Talgan Kumar","family":"Rao","sequence":"first","affiliation":[{"name":"PES University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2017-920X","authenticated-orcid":false,"given":"Narayana","family":"Darapaneni","sequence":"additional","affiliation":[{"name":"Northwestern University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8392-4329","authenticated-orcid":false,"given":"Anwesh Reddy","family":"Paduri","sequence":"additional","affiliation":[{"name":"Great Learning, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7929-8231","authenticated-orcid":false,"given":"Amarnath G","family":"S","sequence":"additional","affiliation":[{"name":"PES University, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3929-3162","authenticated-orcid":false,"given":"Arun","family":"Kumar","sequence":"additional","affiliation":[{"name":"PES University, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1812-0801","authenticated-orcid":false,"given":"Guruprasad","family":"Ps","sequence":"additional","affiliation":[{"name":"PES University, India"}]}],"member":"320","published-online":{"date-parts":[[2023,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"228","volume-title":"workshops. IEEE","author":"Nurse J. R.","year":"2014","unstructured":"J. R. Nurse, O. Buckley, P. A. Legg, M. Goldsmith, S. Creese, G. R. Wright, and M. Whitty, \u201cUnderstanding insider threat: A framework for characterising attacks,\u201d in 2014 IEEE security and privacy workshops. IEEE, 2014, pp. 214\u2013228."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/COMST.2018.2800740"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/ISBA.2018.8311479"},{"key":"e_1_3_2_1_4_1","article-title":"Behavioral analysis of insider threat: A survey and bootstrapped prediction in imbalanced data","author":"Azaria A.","unstructured":"A. Azaria, A. Richardson, S. Kraus, and V. Subrahmanian, \u201cBehavioral analysis of insider threat: A survey and bootstrapped prediction in imbalanced data,\u201d IEEE Transactions on Computational Social Systems,","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"e_1_3_2_1_5_1","first-page":"155","volume-title":"no. 2","year":"2014","unstructured":"vol. 1, no. 2, pp. 135\u2013155, 2014."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1016\/S1361-3723(15)30066-X"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/3205455.3205612"},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"Image-based insider threat detection via geometric transformation","volume":"2021","author":"Li D.","year":"2021","unstructured":"D. Li, L. Yang, H. Zhang, X. Wang, L. Ma, and J. Xiao, \u201cImage-based insider threat detection via geometric transformation,\u201d Security and Communication Networks, vol. 2021, pp. 1\u201318, 2021.","journal-title":"Security and Communication Networks"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1126\/science.272.5270.1905"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/34.541406"},{"key":"e_1_3_2_1_11_1","volume-title":"Advances in neural information processing systems","author":"Li L.-J.","year":"2010","unstructured":"L.-J. Li, H. Su, L. Fei-Fei, and E. Xing, \u201cObject bank: A high-level image representation for scene classification & semantic feature sparsi-fication,\u201d Advances in neural information processing systems, vol. 23, 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/ICInfA.2015.7279659"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1016\/j.procs.2015.03.175"},{"unstructured":"M. Dahiya \u201cApplying intrusion detection technique for intercepting rogue access point in wireless communication.\u201d","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","first-page":"847","article-title":"A review of insider threat detection approaches with iot perspective","volume":"8","author":"Kim A.","year":"2020","unstructured":"A. Kim, J. Oh, J. Ryu, and K. Lee, \u201cA review of insider threat detection approaches with iot perspective,\u201d IEEE Access, vol. 8, pp. 78 847\u201378 867, 2020.","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1080\/19361610.2011.529413"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/ICCIS.2011.214"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.3390\/app10144945"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/CCST.2017.8167792"},{"key":"e_1_3_2_1_20_1","volume-title":"Deep learning for unsupervised insider threat detection in structured cybersecurity data streams","author":"Tuor A.","year":"2017","unstructured":"A. Tuor, S. Kaplan, B. Hutchinson, N. Nichols, and S. Robinson, \u201cDeep learning for unsupervised insider threat detection in structured cybersecurity data streams,\u201d arXiv preprint arXiv:1710.00811, 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/ICGI.2017.37"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/IRI.2019.00027"},{"volume-title":"2019 IEEE 31st International Conference on Tools with Artificial Intelligence","author":"Wang J.","unstructured":"J. Wang, L. Cai, A. Yu, and D. Meng, \u201cEmbedding learning with heterogeneous event sequence for insider threat detection,\u201d in 2019 IEEE 31st International Conference on Tools with Artificial Intelligence","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","first-page":"947","year":"2019","unstructured":"(ICTAI). IEEE, 2019, pp. 947\u2013954.","journal-title":"IEEE"},{"volume-title":"Proceedings of the International Conference on Innova-","author":"Garba N.","unstructured":"N. Garba, S. Rakshit, C. D. Mang, and N. R. Vajjhala, \u201cAn email content-based insider threat detection model using anomaly detection algorithms,\u201d in Proceedings of the International Conference on Innova-","key":"e_1_3_2_1_25_1"},{"unstructured":"tive Computing & Communication (ICICC) 2021.","key":"e_1_3_2_1_26_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1155\/2018\/7243296"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1109\/CSR51186.2021.9527925"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/ISCC53001.2021.9631538"},{"issue":"4","key":"e_1_3_2_1_30_1","first-page":"46","article-title":"Sok: A systematic review of insider threat detection","volume":"10","author":"Kim A.","year":"2019","unstructured":"A. Kim, J. Oh, J. Ryu, J. Lee, K. Kwon, and K. Lee, \u201cSok: A systematic review of insider threat detection.\u201d J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., vol. 10, no. 4, pp. 46\u201367, 2019.","journal-title":"J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.21742\/ijarbms.2017.1.2.01"},{"volume-title":"2022 IEEE 25th International Conference on Computer Supported Cooperative Work in","author":"Zhou S.","unstructured":"S. Zhou, L. Wang, J. Yang, and P. Zhan, \u201cSitd: Insider threat detection using siamese architecture on imbalanced data,\u201d in 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","first-page":"245","year":"2022","unstructured":"Design (CSCWD). IEEE, 2022, pp. 245\u2013250.","journal-title":"IEEE"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.14569\/IJACSA.2021.0120166"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.3390\/app13010259"},{"volume-title":"Proceedings of the 8th ACM CCS International workshop on managing insider security","author":"Rashid T.","unstructured":"T. Rashid, I. Agrafiotis, and J. R. Nurse, \u201cA new take on detecting insider threats: exploring the use of hidden markov models,\u201d in Proceedings of the 8th ACM CCS International workshop on managing insider security","key":"e_1_3_2_1_36_1"},{"doi-asserted-by":"crossref","unstructured":"threats 2016 pp. 47\u201356.","key":"e_1_3_2_1_37_1","DOI":"10.1097\/01.NUMA.0000488867.71356.7c"},{"volume-title":"conference on data science in cyberspace (DSC).","author":"Meng F.","unstructured":"F. Meng, F. Lou, Y. Fu, and Z. Tian, \u201cDeep learning based attribute classification insider threat detection for data security,\u201d in 2018 IEEE third international conference on data science in cyberspace (DSC).","key":"e_1_3_2_1_38_1"},{"unstructured":"IEEE 2018 pp. 576\u2013581.","key":"e_1_3_2_1_39_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1155\/2018\/5906368"},{"key":"e_1_3_2_1_41_1","first-page":"54","volume-title":"18th International Conference, Wuxi, China, June 11\u201313, 2018, Proceedings, Part I 18","author":"Yuan F.","year":"2018","unstructured":"F. Yuan, Y. Cao, Y. Shang, Y. Liu, J. Tan, and B. Fang, \u201cInsider threat detection with deep neural network,\u201d in Computational Science\u2013ICCS 2018: 18th International Conference, Wuxi, China, June 11\u201313, 2018, Proceedings, Part I 18. Springer, 2018, pp. 43\u201354."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1109\/TrustCom50675.2020.00153"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1109\/IJCNN55064.2022.9892163"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1109\/SPW.2018.00043"},{"key":"e_1_3_2_1_45_1","volume-title":"Classifier suites for insider threat detection","author":"Noever D.","year":"1901","unstructured":"D. Noever, \u201cClassifier suites for insider threat detection,\u201d arXiv preprint arXiv:1901.10948, 2019."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1109\/ICISS49785.2020.9315932"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1145\/3406601.3406610"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_48_1","DOI":"10.1109\/TNSM.2020.2967721"},{"key":"e_1_3_2_1_49_1","article-title":"New insider threat detection method based on recurrent neural networks","volume":"17","author":"Al-Mhiqani M. N.","unstructured":"M. N. Al-Mhiqani, R. Ahmad, Z. Z. Abidin, W. Yassin, A. Hassan, and A. N. Mohammad, \u201cNew insider threat detection method based on recurrent neural networks,\u201d Indones. J. Electr. Eng. Comput. Sci, vol. 17,","journal-title":"Indones. J. Electr. Eng. Comput. Sci"},{"unstructured":"no. 3 pp. 1474\u20131479 2020.","key":"e_1_3_2_1_50_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_51_1","DOI":"10.1109\/CNS48642.2020.9162254"},{"key":"e_1_3_2_1_52_1","volume-title":"Computers","author":"Zou S.","year":"2020","unstructured":"S. Zou, H. Sun, G. Xu, and R. Quan, \u201cEnsemble strategy for insider threat detection from user activity logs,\u201d Computers, Materials and Continua, 2020."},{"unstructured":"X. ZUO F. YAN B. HOU Z. CHEN and Y. GUO \u201cInsider threat detection model of power system based on lstm-attention.\u201d","key":"e_1_3_2_1_53_1"},{"key":"e_1_3_2_1_54_1","first-page":"6","volume-title":"2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM). IEEE","author":"Le D. C.","year":"2019","unstructured":"D. C. Le and A. N. Zincir-Heywood, \u201cMachine learning based insider threat modelling and detection,\u201d in 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, 2019, pp. 1\u20136."},{"key":"e_1_3_2_1_55_1","article-title":"A high accuracy and adaptive anomaly detection model with dual-domain graph convolutional network for insider threat detection","author":"Li X.","year":"2023","unstructured":"X. Li, X. Li, J. Jia, L. Li, J. Yuan, Y. Gao, and S. Yu, \u201cA high accuracy and adaptive anomaly detection model with dual-domain graph convolutional network for insider threat detection,\u201d IEEE Transactions on Information Forensics and Security, 2023.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_1_56_1","volume-title":"Hybrid deep learning model using spcagan augmentation for insider threat analysis","author":"Gayathri R.","year":"2022","unstructured":"R. Gayathri, A. Sajjanhar, and Y. Xiang, \u201cHybrid deep learning model using spcagan augmentation for insider threat analysis,\u201d arXiv preprint arXiv:2203.02855, 2022."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_57_1","DOI":"10.1109\/EMR.2017.2667218"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_58_1","DOI":"10.1016\/j.procs.2020.10.012"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.1109\/FUTURETECH.2010.5482741"}],"event":{"acronym":"IC3 2023","name":"IC3 2023: 2023 Fifteenth International Conference on Contemporary Computing","location":"Noida India"},"container-title":["Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607947.3608009","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607947.3608009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:38:06Z","timestamp":1750178286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607947.3608009"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,3]]},"references-count":59,"alternative-id":["10.1145\/3607947.3608009","10.1145\/3607947"],"URL":"https:\/\/doi.org\/10.1145\/3607947.3608009","relation":{},"subject":[],"published":{"date-parts":[[2023,8,3]]},"assertion":[{"value":"2023-09-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}