Detecting Insider Threat from Behavioral Logs Based on Ensemble and Self-Supervised Learning
Algorithm 2
Training algorithm for combined model.
Input: Set to legitimate sessions ; Set of legitimate sessions; T: Number of subdetectors; iter:Iterations number; m:Batch size; :learning rate of Detectors and User Recognizer; ID:User ID of input session