Sign in

Temporal feature aggregation with attention for insider threat detection from activity logs.

Preetam PalPratik ChattopadhyayMayank Swarnkar
Published in: Expert Syst. Appl. (2023)
Keyphrases
  • insider threat
  • anomaly detection
  • temporal constraints
  • databases
  • email
  • information systems
  • computational intelligence
  • human activities