Login / Signup
Deep Dive into Insider Threats: Malicious Activity Detection within Enterprise.
Haitao Xiao
Dan Du
Junrong Liu
Song Liu
Yan Zhu
Yuling Liu
Zhigang Lu
Published in:
CSCWD (2024)
Keyphrases
</>
activity detection
insider threat
insider attacks
email
security architecture
sequence matching
critical infrastructure
data streams
malicious attacks
data mining
search engine
relational databases
knn
subsequence matching