Login / Signup

Applying non-negative matrix factorization methods to discover user;s resource access patterns for computer security tasks.

Dmitry V. TsarevRoman KuryninMikhail PetrovskiyIgor Mashechkin
Published in: HIS (2014)
Keyphrases