Login / Signup

A system for detection of abnormal behavior in BYOD based on web usage patterns.

Taeeun KimHwankuk Kim
Published in: ICTC (2015)
Keyphrases
  • usage patterns
  • abnormal behavior
  • web mining
  • web usage mining
  • web logs
  • usage data
  • high risk
  • web users
  • access logs
  • web log data
  • website
  • web data
  • web content
  • user activities
  • log files
  • web pages
  • web documents