Login / Signup
Data-driven Model-based Detection of Malicious Insiders via Physical Access Logs.
Carmen Cheh
Uttam Thakore
Ahmed M. Fawaz
Binbin Chen
William G. Temple
William H. Sanders
Published in:
ACM Trans. Model. Comput. Simul. (2019)
Keyphrases
</>
data driven
access logs
access patterns
insider threat
web services
keywords
web documents