Login / Signup

Applying graph-based anomaly detection approaches to the discovery of insider threats.

William EberleLawrence B. Holder
Published in: ISI (2009)
Keyphrases