{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:42:30Z","timestamp":1771026150345,"version":"3.50.1"},"reference-count":10,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,4,1]]},"DOI":"10.1587\/transinf.2019edl8180","type":"journal-article","created":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T22:24:45Z","timestamp":1585693485000},"page":"888-891","source":"Crossref","is-referenced-by-count":6,"title":["Against Insider Threats with Hybrid Anomaly Detection with Local-Feature Autoencoder and Global Statistics (LAGS)"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Minhae","family":"JANG","sequence":"first","affiliation":[{"name":"Digital Solution Lab., KEPCO Research Institute"}]},{"given":"Yeonseung","family":"RYU","sequence":"additional","affiliation":[{"name":"Dept. of Computer Engineering, Myongji University"}]},{"given":"Jik-Soo","family":"KIM","sequence":"additional","affiliation":[{"name":"Dept. of Computer Engineering, Myongji University"}]},{"given":"Minkyoung","family":"CHO","sequence":"additional","affiliation":[{"name":"Dept. of Computer Engineering, Myongji University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] L. Liu, O. De Vel, Q.-L. Han, J. Zhang, and Y. Xiang, \u201cDetecting and preventing cyber insider threats: A survey,\u201d IEEE Commun. Surv. Tutorials, vol.20, no.2, pp.1397-1417, 2018. 10.1109\/comst.2018.2800740","DOI":"10.1109\/COMST.2018.2800740"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] G.E. Hinton and R.R. Salakhutdinov, \u201cReducing the dimensionality of data with neural networks,\u201d Science, vol.313, no.5786, pp.504-507, 2006. 10.1126\/science.1127647","DOI":"10.1126\/science.1127647"},{"key":"3","unstructured":"[3] I. Sutskever, O. Vinyals, and Q.V. Le, \u201cSequence to sequence learning with neural networks,\u201d NIPS, pp.3104-3112, 2014."},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] J. Glasser and B. Lindauer, \u201cBridging the Gap: A pragmatic approach to generating insider threat data,\u201d 2013 IEEE Security Privacy Workshops, pp.98-104, IEEE 2013. 10.1109\/spw.2013.37","DOI":"10.1109\/SPW.2013.37"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] T. Rashid, I. Agrafiotis, and J.R.C. Nurse, \u201cA new take on detecting insider threats: Exploring the use of hidden markov models,\u201d Proc. 8th ACM CCS International Workshop on Managing Insider Security Threats, pp.47-56, ACM, 2016. 10.1145\/2995959.2995964","DOI":"10.1145\/2995959.2995964"},{"key":"6","unstructured":"[6] D.W. Ha, K.T. Kang, and Y. Ryu, \u201cDetecting insider threat based on machine learning: Anomaly detection using rnn autoencoder,\u201d J. KIISC, no.4, pp.763-773, Aug. 2017. 10.5244\/c.31.139"},{"key":"7","unstructured":"[7] P. Malhotra, A. Ramakrishnan, G. Anand, L. Vig, P. Agarwal, and G. Shroff, \u201cLSTM-based encoder-decoder for multi-sensor anomaly detection,\u201d arXiv preprint arXiv:1607.00148, 2016."},{"key":"8","unstructured":"[8] A. Tuor, S. Kaplan, B. Hutchinson, N. Nichols, and S. Robinson, \u201cDeep learning for unsupervised insider threat detection in structured cybersecurity data streams,\u201d Proc. AI for Cyber Security Workshop at AAAI 2017, 2017."},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] F. Yuan, Y. Cao, Y. Shang, Y. Liu, J. Tan, and B. Fang, \u201cInsider threat detection with deep neural network,\u201d International Conference on Computational Science, vol.10860, pp.43-54, Springer, 2018. 10.1007\/978-3-319-93698-7_4","DOI":"10.1007\/978-3-319-93698-7_4"},{"key":"10","unstructured":"[10] \u201cLAGS,\u201d https:\/\/github.com\/minkcho\/lags."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/4\/E103.D_2019EDL8180\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,4]],"date-time":"2020-04-04T03:28:06Z","timestamp":1585970886000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/4\/E103.D_2019EDL8180\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":10,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019edl8180","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}