C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
UAG: User Action Graph Based on System Logs for Insider Threat Detection.
Xu Wang
Jianguo Jiang
Yan Wang
Qiujian Lv
Leiqi Wang
Published in:
ISCC (2023)
Keyphrases
</>
insider threat
database
information systems