Laaeb a Comprehensive Log-Text Analysis Based Approach for Insider Threat Detection
COMPUTERS & SECURITY(2025)
Key words
Insider threat detection,Log analysis,Anomaly detection,Cyber security,User behavior analysis
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined