Business process mining based insider threat detection system
Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the...
Saved in:
| Main Authors: | Tai-ming ZHU, Yuan-bo GUO, An-kang JU, Jun MA |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2016-10-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016265/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Study on user behavior profiling in insider threat detection
by: Yuanbo GUO, et al.
Published: (2018-12-01) -
Insider threat detection for specific threat scenarios
by: Tian Tian, et al.
Published: (2025-03-01) -
A Review of the Insider Threat, a Practitioner Perspective Within the U.K. Financial Services
by: Findlay Whitelaw, et al.
Published: (2024-01-01) -
A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods
by: Fatima Rashed Alzaabi, et al.
Published: (2024-01-01) -
Daily insider threat detection with hybrid TCN transformer architecture
by: Xiaoyun Ye, et al.
Published: (2025-08-01)