Login / Signup
Insider threat detection of adaptive optimization DBN for behavior logs.
Jiange Zhang
Yue Chen
Ankang Ju
Published in:
Turkish J. Electr. Eng. Comput. Sci. (2018)
Keyphrases
</>
insider threat
anomaly detection
data sets
databases
operating system
belief networks
visual analysis
security architecture