Kim, J., Park, M., Kim, H., Cho, S., & Kang, P. (2019). Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms. Applied sciences, 9(19), 4018. https://doi.org/10.3390/app9194018
Chicago Style (17th ed.) CitationKim, Junhong, Minsik Park, Haedong Kim, Suhyoun Cho, and Pilsung Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. https://doi.org/10.3390/app9194018.
MLA (9th ed.) CitationKim, Junhong, et al. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences, vol. 9, no. 19, 2019, p. 4018, https://doi.org/10.3390/app9194018.
Warning: These citations may not always be 100% accurate.