Login / Signup
A system for detection of abnormal behavior in BYOD based on web usage patterns.
Taeeun Kim
Hwankuk Kim
Published in:
ICTC (2015)
Keyphrases
</>
usage patterns
abnormal behavior
web mining
web usage mining
web logs
usage data
high risk
web users
access logs
web log data
website
web data
web content
user activities
log files
web pages
web documents