October 2023
·
2 Reads
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
October 2023
·
2 Reads
October 2021
·
4 Reads
March 2021
·
5 Reads
June 2020
·
17 Reads
·
1 Citation
June 2020
·
15 Reads
·
6 Citations
June 2020
·
45 Reads
December 2019
·
4 Reads
... Another crucial aspect of designing secure systems is implementing continuous monitoring and analysis of system behavior (Zhang et al., 2020). This allows for the detection of any abnormal activities or deviations from expected behavior, which could indicate a potential security breach or unauthorized access. ...
June 2020
... The clustering algorithm [24,62,102,131,45] can effectively divide users into groups based on their behavior. However, user behavior may change in different scenarios, and this may generate much unknown data. ...
June 2020