Login / Signup
Combating Insider Threats by User Profiling from Activity Logging Data.
Mohamed Dahmane
Samuel Foucher
Published in:
ICDIS (2018)
Keyphrases
</>
user profiling
data structure
database
data analysis
data sources
databases
end users
data mining techniques
association rule mining
data mining methods
user interests