Login / Signup
Profiling file repository access patterns for identifying data exfiltration activities.
Yi Hu
Charles E. Frank
James Walden
Emily Crawford
Dhanuja Kasturiratna
Published in:
CICS (2011)
Keyphrases
</>
access patterns
database
data analysis
end users
knowledge discovery
data mining techniques
spatial locality
metadata
data sources
web mining
file system
usage patterns