Sign in

Data-driven Model-based Detection of Malicious Insiders via Physical Access Logs.

Carmen ChehUttam ThakoreAhmed M. FawazBinbin ChenWilliam G. TempleWilliam H. Sanders
Published in: ACM Trans. Model. Comput. Simul. (2019)
Keyphrases
  • data driven
  • access logs
  • access patterns
  • insider threat
  • web services
  • keywords
  • web documents