Existing counting models suffer significant performance degradation when tested on data from unknown scenarios (out-of-distribution data), due to the domain shift problem. In practical applications, ...
Abstract: Insider threat is destructive and concealable, making addressing it a challenging task in cybersecurity. Most existing methods transform user behavior into sequential information and analyze ...