Login / Signup
Probabilistic threat propagation for malicious activity detection.
Kevin M. Carter
Nwokedi C. Idika
William W. Streilein
Published in:
ICASSP (2013)
Keyphrases
</>
activity detection
sequence matching
insider threat
database systems
database
email