{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1363670320044577280.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1109/spw.2013.37"}},{"identifier":{"@type":"URI","@value":"http://xplorestaging.ieee.org/ielx7/6564486/6565207/06565236.pdf?arnumber=6565236"}}],"dc:title":[{"@value":"Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data"}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1383670320044577281","@type":"Researcher","foaf:name":[{"@value":"Brian Lindauer"}]},{"@id":"https://cir.nii.ac.jp/crid/1383670320044577280","@type":"Researcher","foaf:name":[{"@value":"Joshua Glasser"}]}],"publication":{"prism:publicationName":[{"@value":"2013 IEEE Security and Privacy Workshops"}],"dc:publisher":[{"@value":"IEEE"}],"prism:publicationDate":"2013-05","prism:startingPage":"98","prism:endingPage":"104"},"reviewed":"false","url":[{"@id":"http://xplorestaging.ieee.org/ielx7/6564486/6565207/06565236.pdf?arnumber=6565236"}],"createdAt":"2013-07-25","modifiedAt":"2017-06-21","relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1390002184891179136","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Against Insider Threats with Hybrid Anomaly Detection with Local-Feature Autoencoder and Global Statistics (LAGS)"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1109/spw.2013.37"},{"@type":"CROSSREF","@value":"10.1587/transinf.2019edl8180_references_DOI_XpHJkYYf3c4P7vgCmj84p7Klh3e"}]}