Login / Signup
UAG: User Action Graph Based on System Logs for Insider Threat Detection.
Xu Wang
Jianguo Jiang
Yan Wang
Qiujian Lv
Leiqi Wang
Published in:
ISCC (2023)
Keyphrases
</>
insider threat
database
information systems