Login / Signup
Call Trace and Memory Access Pattern based Runtime Insider Threat Detection for Big Data Platforms.
Santosh Aditham
Nagarajan Ranganathan
Srinivas Katkoori
Published in:
CoRR (2016)
Keyphrases
</>
big data
high volume
memory access
insider threat
data analytics
cloud computing
data management
data access
data analysis
business intelligence
data processing
knowledge discovery
social media
data storage
main memory
database applications
social networks