Login / Signup
Detecting Anomalies in Active Insider Stepping Stone Attacks.
Giovanni Di Crescenzo
Abhrajit Ghosh
Abhinay Kampasi
Rajesh Talpade
Yin Zhang
Published in:
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2011)
Keyphrases
</>
detecting anomalies
anomaly detection
data mining applications
abnormal events
insider threat
countermeasures
intrusion detection
databases
decision making
database systems
decision support
watermarking scheme