Insider Threat Detection Using a Graph-Based Approach

Article Properties
Journal Category
Social Sciences
Social pathology
Social and public welfare
Criminology
Refrences
Title Journal Journal Categories Citations Publication Date
10.3233/IDA-2007-11606 2007
Graph-based data mining IEEE Intelligent Systems and their Applications 102 1998
Graph-based data mining AI Magazine
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Technology: Mechanical engineering and machinery
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
  • Technology: Engineering (General). Civil engineering (General)
2008
10.1145/1348549.1348559 2007
IEEE VisWeek Compendium 2008
Citations
Title Journal Journal Categories Citations Publication Date
Unveiling Shadows: Harnessing Artificial Intelligence for Insider Threat Detection

Engineering, Technology & Applied Science Research
  • Technology: Engineering (General). Civil engineering (General)
2024
Temporal feature aggregation with attention for insider threat detection from activity logs Expert Systems with Applications
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Technology: Manufactures: Production management. Operations management
  • Technology: Mechanical engineering and machinery
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
  • Technology: Engineering (General). Civil engineering (General)
3 2023
Demystifying Graph Databases: Analysis and Taxonomy of Data Organization, System Designs, and Graph Queries

ACM Computing Surveys
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
3 2023
Insider Threat Detection Based on Deep Clustering of Multi-Source Behavioral Events

Applied Sciences
  • Technology: Engineering (General). Civil engineering (General)
  • Science: Biology (General)
  • Science: Physics
  • Science: Chemistry
  • Science: Chemistry: General. Including alchemy
  • Technology: Engineering (General). Civil engineering (General)
  • Science: Chemistry
  • Science: Physics
  • Technology: Technology (General): Industrial engineering. Management engineering
  • Technology: Chemical technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Materials of engineering and construction. Mechanics of materials
  • Technology: Engineering (General). Civil engineering (General)
1 2023
An Artificial Neural Network Autoencoder for Insider Cyber Security Threat Detection

Future Internet
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Science: Science (General): Cybernetics: Information theory
2 2023
Citations Analysis
Category Category Repetition
Science: Mathematics: Instruments and machines: Electronic computers. Computer science16
Science: Science (General): Cybernetics: Information theory11
Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication8
Technology: Technology (General): Industrial engineering. Management engineering: Information technology7
Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics7
Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software7
Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware6
Technology: Engineering (General). Civil engineering (General)6
Technology: Mechanical engineering and machinery5
Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks5
Science: Physics3
Technology: Technology (General): Industrial engineering. Management engineering3
Technology: Electrical engineering. Electronics. Nuclear engineering3
Science: Biology (General)2
Science: Chemistry2
Science: Chemistry: General. Including alchemy2
Technology: Chemical technology2
Technology: Electrical engineering. Electronics. Nuclear engineering: Materials of engineering and construction. Mechanics of materials2
Science: Science (General)2
Technology: Manufactures: Production management. Operations management1
Technology: Manufactures1
Science: Astronomy: Astrophysics1
Science: Mathematics1
Social Sciences: Sociology (General)1
Geography. Anthropology. Recreation: Anthropology1
Social Sciences1
The category Science: Mathematics: Instruments and machines: Electronic computers. Computer science 16 is the most commonly referenced area in studies that cite this article. The first research to cite this article was titled EVOLVING INSIDER THREAT DETECTION STREAM MINING PERSPECTIVE and was published in 2013. The most recent citation comes from a 2024 study titled Unveiling Shadows: Harnessing Artificial Intelligence for Insider Threat Detection. This article reached its peak citation in 2020, with 5 citations. It has been cited in 26 different journals, 19% of which are open access. Among related journals, the IEEE Access cited this research the most, with 3 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year