Login / Signup

Detecting Insider Information Theft Using Features from File Access Logs.

Christopher S. GatesNinghui LiZenglin XuSuresh N. ChariIan M. MolloyYoungja Park
Published in: ESORICS (2) (2014)
Keyphrases
  • access logs
  • information sources
  • database
  • co occurrence
  • domain knowledge
  • web search
  • access patterns