Computer security impaired by legitimate users.
Denis BesnardBudi AriefPublished in: Comput. Secur. (2004)
Keyphrases
- computer security
- computer systems
- network security
- end users
- anomaly detection
- information security
- user interface
- intrusion detection
- social media
- model selection
- internet users
- intrusion detection system
- user profiles
- user interaction
- database
- maximum likelihood
- recommender systems
- high dimensional
- information technology