Login / Signup
Modeling and detecting anomalous topic access.
Siddharth Gupta
Casey Hanson
Carl A. Gunter
Mario Frank
David M. Liebovitz
Bradley A. Malin
Published in:
ISI (2013)
Keyphrases
</>
detecting anomalous
intrusion detection
anomaly detection
topic models
real time
training data
network traffic
access control
information access
topic modeling
database
databases
information retrieval
pairwise
multi document summarization