Applying non-negative matrix factorization methods to discover user;s resource access patterns for computer security tasks.
Dmitry V. TsarevRoman KuryninMikhail PetrovskiyIgor MashechkinPublished in: HIS (2014)
Keyphrases
- factorization methods
- computer security
- access patterns
- matrix factorization
- tensor factorization
- collaborative filtering
- web logs
- recommender systems
- low rank
- information security
- prefetching
- intrusion detection system
- user interface
- computer systems
- web usage mining
- anomaly detection
- web users
- network security
- file system
- relevance feedback
- end users
- intrusion detection
- singular value decomposition
- missing data
- user preferences
- nonnegative matrix factorization
- network intrusion detection