Login / Signup
Detecting Insider Information Theft Using Features from File Access Logs.
Christopher S. Gates
Ninghui Li
Zenglin Xu
Suresh N. Chari
Ian M. Molloy
Youngja Park
Published in:
ESORICS (2) (2014)
Keyphrases
</>
access logs
information sources
database
co occurrence
domain knowledge
web search
access patterns