Login / Signup

Insider threat detection of adaptive optimization DBN for behavior logs.

Jiange ZhangYue ChenAnkang Ju
Published in: Turkish J. Electr. Eng. Comput. Sci. (2018)
Keyphrases
  • insider threat
  • anomaly detection
  • data sets
  • databases
  • operating system
  • belief networks
  • visual analysis
  • security architecture