Search:
Match:
1 results

Analysis

This article describes a research paper on insider threat detection. The approach uses Graph Convolutional Networks (GCN) and Bidirectional Long Short-Term Memory networks (Bi-LSTM) along with explicit and implicit graph representations. The focus is on a technical solution to a cybersecurity problem.
Reference