• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs.

Liu LiuChao ChenJun ZhangOlivier Y. de VelYang Xiang
Published in: TrustCom (2020)
Keyphrases
  • access control
  • multi source
  • security requirements
  • social networks
  • data analysis
  • data fusion
  • database
  • decision making
  • database systems
  • relational databases
  • data integration
  • information fusion