Insider threat detection based on operational attention and data augmentation
In recent years, there has been an increased focus on the issue of insider threats.Insider threats are a major cause security breaches in organizations and pose an ongoing challenge.By analyzing the existing insider threat data, it was identified that the biggest challenge in insider threat detectio...
Saved in:
Main Authors: | Guanyun FENG, Cai FU, Jianqiang LYU, Lansheng HAN |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2023-06-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023042 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Study on user’s identification system in insider threats
by: PEI Qing-qi1, et al.
Published: (2009-01-01) -
Business process mining based insider threat detection system
by: Tai-ming ZHU, et al.
Published: (2016-10-01) -
Study on user behavior profiling in insider threat detection
by: Yuanbo GUO, et al.
Published: (2018-12-01) -
Multi-Granularity User Anomalous Behavior Detection
by: Wenying Feng, et al.
Published: (2024-12-01) -
BUILDING COMMUNITY IN THE CHURCH BETWEEN INSIDERS AND OUTSIDERS
by: J. Dickie
Published: (2020-06-01)