Insider Threat Detection Using GCN and Bi-LSTM with Explicit and Implicit Graph Representations
Research#cybersecurity🔬 Research|Analyzed: Jan 4, 2026 10:00•
Published: Dec 20, 2025 19:48
•1 min read
•ArXivAnalysis
This article describes a research paper on insider threat detection. The approach uses Graph Convolutional Networks (GCN) and Bidirectional Long Short-Term Memory networks (Bi-LSTM) along with explicit and implicit graph representations. The focus is on a technical solution to a cybersecurity problem.
Key Takeaways
Reference / Citation
View Original"Insider Threat Detection Using GCN and Bi-LSTM with Explicit and Implicit Graph Representations"