From post

Business Process Mining based Insider Threat Detection System.

, , , и . 3PGCIC, том 1 из Lecture Notes on Data Engineering and Communications Technologies, стр. 467-478. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Self-Attention-Based Approach for Named Entity Recognition in Cybersecurity., , и . CIS, стр. 147-150. IEEE, (2019)网络安全事件关联分析技术与工具研究 (Survey on Network Security Event Correlation Analysis Methods and Tools)., , , и . 计算机科学, 44 (2): 38-45 (2017)Highly efficient federated learning with strong privacy preservation in cloud computing., , , и . Comput. Secur., (2020)基于开源工具集的大数据网络安全态势感知及预警架构 (Framework for Big Data Network Security Situational Awareness and Threat Warning Based on Open Source Toolset)., , и . 计算机科学, 44 (5): 125-131 (2017)An Insider Threat Detection Method Based on Business Process Mining., , , , и . Int. J. Bus. Data Commun. Netw., 13 (2): 83-98 (2017)Insider threat detection of adaptive optimization DBN for behavior logs., , и . Turkish J. Electr. Eng. Comput. Sci., 26 (2): 792-802 (2018)HeteMSD: A Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data., , , , и . Secur. Commun. Networks, (2019)MCKC: a modified cyber kill chain model for cognitive APTs analysis within Enterprise multimedia network., , и . Multim. Tools Appl., 79 (39-40): 29923-29949 (2020)A Risk Analysis Framework for Social Engineering Attack Based on User Profiling., , , , , и . J. Organ. End User Comput., 32 (3): 37-49 (2020)Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric., , и . ICAIS (4), том 11635 из Lecture Notes in Computer Science, стр. 266-278. Springer, (2019)