Login / Signup
Improved Detection of User Malicious Behavior through Log Mining based on IHMM.
Chenchen Liu
Yi Zhong
Yuanli Wang
Published in:
ICSAI (2018)
Keyphrases
</>
malicious behavior
hidden markov models
sequential data
machine learning
relevance feedback
collaborative filtering
data processing
computer networks
gibbs sampler