Sign in

Detecting Anomalies in Active Insider Stepping Stone Attacks.

Giovanni Di CrescenzoAbhrajit GhoshAbhinay KampasiRajesh TalpadeYin Zhang
Published in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2011)
Keyphrases
  • detecting anomalies
  • anomaly detection
  • data mining applications
  • abnormal events
  • insider threat
  • countermeasures
  • intrusion detection
  • databases
  • decision making
  • database systems
  • decision support
  • watermarking scheme