Login / Signup
Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs.
Liu Liu
Chao Chen
Jun Zhang
Olivier Y. de Vel
Yang Xiang
Published in:
TrustCom (2020)
Keyphrases
</>
access control
multi source
security requirements
social networks
data analysis
data fusion
database
decision making
database systems
relational databases
data integration
information fusion