Research Article

Detecting Insider Threat from Behavioral Logs Based on Ensemble and Self-Supervised Learning

Table 2

Architecture of proposed combining model.

PartLayerTypeParameterActivation

RepresentationLSTMLSTM cell(−, 100)ReLU
FC _1Fully connected(100, 256)ReLU

DetectorDrop1Dropout0.5
FC _2Fully connected(256, 1)Sigmoid
FC_3Fully connected(256, 512)ReLU

User recognizerDrop2Dropout0.5
FC_4Fully connected(512, 1000)