Login / Signup

elicit: A System for Detecting Insiders Who Violate Need-to-Know.

Marcus A. MaloofGregory D. Stephens
Published in: RAID (2007)
Keyphrases
  • data sets
  • real world
  • information systems
  • image segmentation
  • insider threat