Existing counting models suffer significant performance degradation when tested on data from unknown scenarios (out-of-distribution data), due to the domain shift problem. In practical applications, ...
Abstract: Insider threat is destructive and concealable, making addressing it a challenging task in cybersecurity. Most existing methods transform user behavior into sequential information and analyze ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results