SCOUT: Security by computing OUTliers on activity logs.
Michele IanniElio MasciariPublished in: Comput. Secur. (2023)
Keyphrases
- information security
- security policies
- access control
- user activity
- intrusion detection
- outlier detection
- human activities
- network security
- security issues
- computer security
- data sets
- security vulnerabilities
- security level
- data security
- security mechanisms
- security requirements
- security analysis
- biometric systems
- log data
- website
- security problems
- activity patterns
- database
- information assurance