Login / Signup
Enhancing directory virtualization to detect insider activity.
William R. Claycomb
Dongwan Shin
Gail-Joon Ahn
Published in:
Secur. Commun. Networks (2012)
Keyphrases
</>
detection method
cloud computing
detection algorithm
high availability
decision trees
hierarchical structure
virtual machine
data sets
databases
information systems
operating system
data center
wireless sensor networks