[1] |
LANE T,BRODLEY C E.An empirical study of two approaches to sequence learning for anomaly detection[J].Machine Learning,2003,51(1):73-107.
|
[2] |
YANG Guang,MA Jiangang,YU Aimin,et al.Survey of insider threat detection[J].Journal of Cyber Security,2016,1(3):21-36.(in Chinese) 杨光,马建刚,于爱民,等.内部威胁检测研究[J].信息安全学报,2016,1(3):21-36.
|
[3] |
LU Jun,LIU Daxin,FU Liping.Research and design of dynamic security model for preventing network internal threats[J].Computer System Applications,2005,14(9):37-40.(in Chinese) 陆军,刘大昕,付立平.防范网络内部威胁的动态安全模型的研究与设计[J].计算机系统应用,2005,14(9):37-40.
|
[4] |
LI Dianwei,HE Mingliang,YUAN Fang.Research on insider threat detection based on role behavior pattern mining[J].Information Network Security,2017,17(3):27-32.(in Chinese) 李殿伟,何明亮,袁方.基于角色行为模式挖掘的内部威胁检测研究[J].信息网络安全,2017,17(3):27-32.
|
[5] |
OKA M,OYAMA Y,ABE H.Anomaly detection using layered networks based on eigen co-occurrence matrix[C]//Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection.Sophia Antipolis,France:[s.n.],2004:223-237.
|
[6] |
SCHONLAU M,DUMOUCHEL W,JU W H,et al.Computer intrusion:detecting masquerades[J].Statistical Science,2001,16(1):58-74.
|
[7] |
NGUYEN N,REIHER P,KUENNING G H.Detecting insider threats by monitoring system call activity[C]//Proceedings of Information Assurance Workshop.Washington D.C.,USA:IEEE Press,2004:3-10.
|
[8] |
HUANG Tie,ZHANG Fen.Hidden Markov model for internal threat detection[J].Computer Engineering and Design,2010,31(5):965-968.(in Chinese) 黄铁,张奋.基于隐马尔可夫模型的内部威胁检测方法[J].计算机工程与设计,2010,31(5):965-968.
|
[9] |
LI L,MANIKOPOULOS C N.Windows NT one-class masquerade detection[C]//Proceedings of the 5th Annual IEEE SMC Information Assurance Workshop.Washington D.C.,USA:IEEE Press,2004:447-465.
|
[10] |
ZHANG Rui,CHEN Xiaojun,SHI Jinqiao,et al.Detecting insider threat based on document access behavior analysis[C]//Proceedings of Asia Pacific Web Conference.Berlin,Germany:Springer,2014:376-387.
|
[11] |
CAMI J B,RODR J.Towards a masquerade detection system based on user’s tasks[C]//Proceedings of the 17th International Workshop on Recent Advances in Intrusion Detection.Berlin,Germany:Springer,2014:447-465.
|
[12] |
GOLDRING T.Authenticating users by profiling behavior[EB/OL].[2019-07-05].https://cs.fit.edu/~pkc/dmsec03/slides.
|
[13] |
WEI Bocheng,LIN Jinguan,XIE Fengchang.Statistical diagnosis[M].Beijing:Higher Education Press,2009.(in Chinese) 韦博成,林金官,解锋昌.统计诊断[M].北京:高等教育出版社,2009.
|
[14] |
BANNON L,CYPHER A,GREENSPAN S,et al.Evaluation and analysis of users’ activity organization[C]//Proceedings of ACM SIGCHI Conference on Human Factors in Computing Systems.New York,USA:ACM Press,1983:54-57.
|
[15] |
AHMED A A E,TRAORE I.A new biometric technology based on mouse dynamics[J].IEEE Transactions on Dependable and Secure Computing,2007,4(3):165-179.
|
[16] |
CHEN Guangxin.Proficient in feature engineering[M].Beijing:People’s Posts and Telecom Press,2019.(in Chinese)陈光欣.精通特征工程[M].北京:人民邮电出版社,2019.
|
[17] |
SHI Shisong,CHENG Yiming,XIAO Xiaolong.Probability theory and mathematical statistics [M].Beijing:Higher Education Press,2011.(in Chinese)茆诗松,程依明,濮晓龙.概率论与数理统计教程[M].北京:高等教育出版社,2011.
|
[18] |
WU Xizhi,WANG Zhaojun.Nonparametric statistical method[M].Beijing:Higher Education Press,1996.(in Chinese)吴喜之,王兆军.非参数统计方法[M].北京:高等教育出版社,1996.
|
[19] |
WU Xizhi.Statistics:from data to conclusion[M].Beijing:China Statistics Press,2014.(in Chinese)吴喜之.统计学:从数据到结论[M].北京:中国统计出版社,2014.
|
[20] |
ZHOU Zhihua.Machine learning[M].Beijing:Tsinghua University Press,2016.(in Chinese)周志华.机器学习[M].北京:清华大学出版社,2016.
|
[21] |
ZHOU Tao,HAN Xiaoyu,YAN Xiaoyong,et al.Statistical mechanics on temporal and spatial activities of human[J].Journal of University of Electronic Science and Technology of China,2013,42(4):481-540.(in Chinese)周涛,韩筱璞,闫小勇,等.人类行为时空特性的统计力学[J].电子科技大学学报,2013,42(4):481-540.
|