• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Applying graph-based anomaly detection approaches to the discovery of insider threats.

William EberleLawrence B. Holder
Published in: ISI (2009)
Keyphrases