Proceedings of the 11th International Conference on Advances in Information Technology 2020
DOI: 10.1145/3406601.3406610
|View full text |Cite
|
Sign up to set email alerts
|

User Behavior Analytics for Anomaly Detection Using LSTM Autoencoder - Insider Threat Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 59 publications
(45 citation statements)
references
References 12 publications
0
37
0
Order By: Relevance
“…A recurrent neural network (RNN) structure is exploited for the encoder f enc and the predictor f pre to process sequential data, and it is a commonly used approach to handle time-series data [10,15,19]. The encoder f enc and the predictor f pre are compiled using LSTM cells [24].…”
Section: B Methodology Overviewmentioning
confidence: 99%
See 4 more Smart Citations
“…A recurrent neural network (RNN) structure is exploited for the encoder f enc and the predictor f pre to process sequential data, and it is a commonly used approach to handle time-series data [10,15,19]. The encoder f enc and the predictor f pre are compiled using LSTM cells [24].…”
Section: B Methodology Overviewmentioning
confidence: 99%
“…In recent years, deep learning-based methods have been presented showing better performance [9,10,14,15] compared with the machine learning-based methods. Tuor et al [15] showed a method to detect abnormal network activities from system logs based on a long short-term memory (LSTM) model.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations