Login / Signup
Data mining computer audit logs to detect computer misuse.
Sharon Kay Heatley
James R. Otto
Published in:
Intell. Syst. Account. Finance Manag. (1998)
Keyphrases
</>
data mining
computer systems
intrusion detection
data sets
learning algorithm
rough sets
computer architecture
data mining methods
data mining algorithms
association rule mining
lightweight
text mining
data structure
web services
metadata
social networks
search engine
machine learning