Login / Signup
Security audit of data flows across enterprise systems and networks.
Nikolai Joukov
Vladislav Shorokhov
Dmytro Tantsuyev
Published in:
ICITST (2014)
Keyphrases
</>
data sets
data processing
data collection
enterprise systems
database
intrusion detection
data structure
data mining techniques
network structure
data analysis
mobile devices
knowledge discovery
human activities
data quality
mobile users