Login / Signup
Protection against unauthorized access and computer crime in Norwegian enterprises.
Janne Merete Hagen
Tormod Kalberg Sivertsen
Chunming Rong
Published in:
J. Comput. Secur. (2008)
Keyphrases
</>
unauthorized access
access control
law enforcement
security policies
machine learning
intrusion detection system
computer forensics
computer systems
security vulnerabilities
data sets
association rules
database applications
network traffic
crime investigation