Insider threat detection is an emergent concern for industries and governments due to the growing number of attacks in recent years. Several Machine Learning (ML) approaches have been developed to detect insider threats, however, they still suffer from a high number of false alarms. None of those approaches addressed the insider threat problem from the perspective of stream mining data where a concept drift or an outlier is an indication of an insider threat. An outlier refers to anomalous behaviour that deviates from the normal baseline of community's behaviour and is the focus of this paper. To address the shortcoming of existing approaches and realise a novel solution to the problem, we present RandSubOut (Random Subspace Outliers) ap...
This paper studies the difficulties of outlier detection on inexact data. We study the normal instan...
In recent years, intrusion detection has emerged as an important technique for network security. Mac...
This paper reports on insider threat detection research, during which a prototype system (PRODIGAL) ...
Insider threat detection is an emergent concern for academia, industries, and governments due to the...
Insider threat detection is an emergent concern for academia, industries, and governments due to the...
The topic of insider threat detection is getting an increased concern from academia, industry, and g...
The topic of insider threat detection is getting an increased concern from academia, industry, and g...
The malicious insider threat is getting increased concern by organisations, due to the continuously ...
The malicious insider threat is getting increased concern by organisations, due to the continuously ...
The threat that malicious insiders pose towards organisations is a significant problem. In this pape...
An insider threat scenario refers to the outcome of a set of malicious activities caused by intentio...
Cyber security is vital to the success of today’s digital economy. The major security threats are co...
Insider attacks are an ever-increasing threat for organizations, with dire consequences. Rogue emplo...
In recent years, advances in hardware technology have facilitated new ways of collecting data contin...
In the information era, the core business and confidential information of enterprises/organizations ...
This paper studies the difficulties of outlier detection on inexact data. We study the normal instan...
In recent years, intrusion detection has emerged as an important technique for network security. Mac...
This paper reports on insider threat detection research, during which a prototype system (PRODIGAL) ...
Insider threat detection is an emergent concern for academia, industries, and governments due to the...
Insider threat detection is an emergent concern for academia, industries, and governments due to the...
The topic of insider threat detection is getting an increased concern from academia, industry, and g...
The topic of insider threat detection is getting an increased concern from academia, industry, and g...
The malicious insider threat is getting increased concern by organisations, due to the continuously ...
The malicious insider threat is getting increased concern by organisations, due to the continuously ...
The threat that malicious insiders pose towards organisations is a significant problem. In this pape...
An insider threat scenario refers to the outcome of a set of malicious activities caused by intentio...
Cyber security is vital to the success of today’s digital economy. The major security threats are co...
Insider attacks are an ever-increasing threat for organizations, with dire consequences. Rogue emplo...
In recent years, advances in hardware technology have facilitated new ways of collecting data contin...
In the information era, the core business and confidential information of enterprises/organizations ...
This paper studies the difficulties of outlier detection on inexact data. We study the normal instan...
In recent years, intrusion detection has emerged as an important technique for network security. Mac...
This paper reports on insider threat detection research, during which a prototype system (PRODIGAL) ...