您当前的位置:
首页 >
文章列表页 >
Business process mining based insider threat detection system
Contents Papers | 更新时间:2024-06-05
    • Business process mining based insider threat detection system

    • Journal on Communications   Vol. 37, Issue Z1, Pages: 180-188(2016)
    • DOI:10.11959/j.issn.1000-436x.2016265    

      CLC: TP391
    • Online First:2016-10

      Published:25 October 2016

    移动端阅览

  • Tai-ming ZHU, Yuan-bo GUO, An-kang JU, et al. Business process mining based insider threat detection system[J]. Journal on Communications, 2016, 37(Z1): 180-188. DOI: 10.11959/j.issn.1000-436x.2016265.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1276

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Anomaly detection method for intelligent UAV networks based on collaborative adversarial enhanced generative model
Deep learning architecture for anomaly detection, classification, and localization in free-space optical communication
Anomaly detection method for spatio-temporal correlation of WSN nodes based on graph prompt fine-tuning
Protocol field mutation method for 5G core network based on adaptive meta-learning
Research on traffic representation in network anomaly detection

Related Author

SUI He
MA Chunyan
LONG Lingchun
GU Zhaojun
LIU Jiajia
DING Lei
SONG Song
WU Tingwei

Related Institution

College of Aeronautical Engineering, Civil Aviation University of China
Information Security Evaluation Center, Civil Aviation University of China
School of Mechanical Engineering, North University of China
School of Cyber Science and Technology, Guangzhou University
School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications
0