UAG: User Action Graph Based on System Logs for Insider Threat Detection.
ISCC(2023)
Key words
Insider Threats,Anomaly Detection,User Action Graph,Cyber Security
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined