Research Article
Detecting Insider Threat from Behavioral Logs Based on Ensemble and Self-Supervised Learning
Table 2
Architecture of proposed combining model.
| Part | Layer | Type | Parameter | Activation |
| Representation | LSTM | LSTM cell | (−, 100) | ReLU | FC _1 | Fully connected | (100, 256) | ReLU |
| Detector | Drop1 | Dropout | 0.5 | — | FC _2 | Fully connected | (256, 1) | Sigmoid | FC_3 | Fully connected | (256, 512) | ReLU |
| User recognizer | Drop2 | Dropout | 0.5 | — | FC_4 | Fully connected | (512, 1000) | — |
|
|