Login / Signup
elicit: A System for Detecting Insiders Who Violate Need-to-Know.
Marcus A. Maloof
Gregory D. Stephens
Published in:
RAID (2007)
Keyphrases
</>
data sets
real world
information systems
image segmentation
insider threat