Sign in

Towards Process Mining Utilization in Insider Threat Detection from Audit Logs.

Martin MacákIvan VanatMichal MerjavyTomás JevocinBarbora Buhnova
Published in: SNAMS (2020)
Keyphrases
  • process mining
  • event logs
  • process model
  • insider threat
  • business process
  • business processes
  • intrusion detection
  • formal concept analysis
  • security policies
  • email
  • security architecture