Compromised user credentials detection in a digital enterprise using behavioral analytics.
Saleh ShahBabar ShahAdnan AminFeras N. Al-ObeidatFrancis ChowFernando MoreiraSajid AnwarPublished in: Future Gener. Comput. Syst. (2019)
Keyphrases
- intranet search
- detection accuracy
- user preferences
- user interface
- user interaction
- user profiles
- detection method
- information management
- object detection
- business applications
- access control
- data mining
- false positives
- user satisfaction
- learning analytics
- automatic detection
- user defined
- data warehouse
- user model
- business intelligence
- detection algorithm
- user feedback
- false alarms
- data management
- knowledge management
- case study