Login / Signup

Improved Detection of User Malicious Behavior through Log Mining based on IHMM.

Chenchen LiuYi ZhongYuanli Wang
Published in: ICSAI (2018)
Keyphrases
  • malicious behavior
  • hidden markov models
  • sequential data
  • machine learning
  • relevance feedback
  • collaborative filtering
  • data processing
  • computer networks
  • gibbs sampler