Login / Signup

Profiling file repository access patterns for identifying data exfiltration activities.

Yi HuCharles E. FrankJames WaldenEmily CrawfordDhanuja Kasturiratna
Published in: CICS (2011)
Keyphrases
  • access patterns
  • database
  • data analysis
  • end users
  • knowledge discovery
  • data mining techniques
  • spatial locality
  • metadata
  • data sources
  • web mining
  • file system
  • usage patterns