-
1
Multi-Granularity User Anomalous Behavior Detection
Published 2024-12-01Subjects: “…insider threat detection…”
Get full text
Article -
2
Business process mining based insider threat detection system
Published 2016-10-01Subjects: “…insider threat…”
Get full text
Article -
3
Study on user behavior profiling in insider threat detection
Published 2018-12-01Subjects: Get full text
Article -
4
Insider threat detection based on operational attention and data augmentation
Published 2023-06-01Subjects: “…Insider threat detection…”
Get full text
Article -
5
Method of dynamic real-time authentication
Published 2016-03-01Subjects: “…insider threat…”
Get full text
Article -
6
Study on user’s identification system in insider threats
Published 2009-01-01Subjects: “…insider threat…”
Get full text
Article