Login / Signup
Temporal feature aggregation with attention for insider threat detection from activity logs.
Preetam Pal
Pratik Chattopadhyay
Mayank Swarnkar
Published in:
Expert Syst. Appl. (2023)
Keyphrases
</>
insider threat
anomaly detection
temporal constraints
databases
email
information systems
computational intelligence
human activities