Research Article

User Audit Model Based on Attribute Measurement and Similarity Measurement

Table 2

Symbol description.

Detection resultActual situation
Malicious usersNormal users

Malicious usersTPFP
Normal usersFNTN