Login / Signup
Towards Process Mining Utilization in Insider Threat Detection from Audit Logs.
Martin Macák
Ivan Vanat
Michal Merjavy
Tomás Jevocin
Barbora Buhnova
Published in:
SNAMS (2020)
Keyphrases
</>
process mining
event logs
process model
insider threat
business process
business processes
intrusion detection
formal concept analysis
security policies
email
security architecture