Login / Signup

Probabilistic threat propagation for malicious activity detection.

Kevin M. CarterNwokedi C. IdikaWilliam W. Streilein
Published in: ICASSP (2013)
Keyphrases
  • activity detection
  • sequence matching
  • insider threat
  • database systems
  • database
  • email