1 |
Small and Medium Business Administration, "2016 Technical statistics survey report for small and Medium businesses", 2016.
|
2 |
Vormetric, "Insider threat Repoert", 2015
|
3 |
Hyun-Song Jang, "Data-mining Based Anomaly Detection in Document Management System", ISSN 1975-7700, 2015
|
4 |
Young-baek Kwon, In-seok Kim, "A Study on Anomaly Signal Detection and Management Model Uing Big Data", JIIBC, Vol.16, No. 6, pp.287-294, Dec. 2016
DOI
|
5 |
Haedong Kim, "Insider Threat Detection based on User Behavior Model and Novelty Detection Algorithms", Korea University, 2017
|
6 |
Ho Jin Lee "Feature Selection Practice for Unsupervised Learning of Credit Card Fraud Detection", Korea University, Feb. 2017.
|
7 |
Pallabi Parveen, Nate McDanial, Varun S. Hariharan, "Unsupervised Ensemble based Learning for Insider Threat Detection", IEEE 2012.
|
8 |
Eldardiry, H., Sricharn,k.,Liu, j., Hanley,J., Price,B., Brdiczka, O., & Bart,E(2014). "Multi-source fusion for anomaly detection: using across-domain and across-time peer-group consistency checks". Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 5(2),39-58
|
9 |
Tae-ho Kim, "Feature Selection Optimization in Unsupervised Learning for Insider threat Detection", Korea University, 2018
|
10 |
Youn-Im Choi, "A Study on Improvement of K-means Clustering With Bisecting", Chung-Ang University, Aug. 2011
|
11 |
Martin Ester, Hans-Peter Kriegel, Jorg Sander, Xiaowei Xu, "A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise", Proceedings of the Second International Conference on Knowledge Discovery and Data Mining(KDD-96), AAAI Press. pp. 226-231, 1996
|