F Meng, P Lu, J Li, T Hu, M Yin, F Lou - 2021 IEEE Sixth International …, 2021 - computer.org
The concealment and confusion nature of insider threat makes it a challenging task for
security analysts to identify insider threat from log data. To detect insider threat, we propose …