Login / Signup
Detecting insider activity using enhanced directory virtualization.
William R. Claycomb
Dongwan Shin
Published in:
Insider Threats@CCS (2010)
Keyphrases
</>
operating system
metadata
human activities
data sets
artificial intelligence
video sequences
cloud computing
cost effective
hierarchical structure
data center
distributed computing
high availability
brain activity
activity patterns