Based on the algorithms published in Paper Titled : Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms.
Primary LanguageJupyter NotebookCreative Commons Zero v1.0 UniversalCC0-1.0