Author of the publication

Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis.

, , , , , and . Comput. Secur., (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Method for Network Security Situation Based on Attack Prediction., , , and . Secur. Commun. Networks, (2017)Confusing-Keyword Based Secure Search over Encrypted Cloud Data., , , , and . Mob. Networks Appl., 25 (1): 125-132 (2020)Enterprise LST Algorithm Development and Its Evaluation with NOAA 20 Data., , , , and . Remote. Sens., 11 (17): 2003 (2019)Ten Years of VIIRS Land Surface Temperature Product Validation., , , , and . Remote. Sens., 14 (12): 2863 (2022)C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement., , , , , and . Comput. Secur., (2023)Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency., , , and . Secur. Commun. Networks, (2021)An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector., , , , and . Secur. Commun. Networks, (2021)A parameter-free approach to lossless summarization of fully dynamic graphs., , , , and . Inf. Sci., (2022)Natural Language Information Hiding Based on Chinese Mathematical Expression., , , and . Int. J. Netw. Secur., 8 (1): 10-15 (2009)CNN-BiLSTM-Attention: A multi-label neural classifier for short texts with a small set of labels., , , and . Inf. Process. Manag., 60 (3): 103320 (May 2023)