Insider Threat Detection Using GCN and Bi-LSTM with Explicit and Implicit Graph Representations

Research#cybersecurity🔬 Research|Analyzed: Jan 4, 2026 10:00
Published: Dec 20, 2025 19:48
1 min read
ArXiv

Analysis

This article describes a research paper on insider threat detection. The approach uses Graph Convolutional Networks (GCN) and Bidirectional Long Short-Term Memory networks (Bi-LSTM) along with explicit and implicit graph representations. The focus is on a technical solution to a cybersecurity problem.
Reference / Citation
View Original
"Insider Threat Detection Using GCN and Bi-LSTM with Explicit and Implicit Graph Representations"
A
ArXivDec 20, 2025 19:48
* Cited for critical analysis under Article 32.