Generalized approach to modeling user activity graphs for network security and public safety monitoring.
Nikolay SergeevAlexey A. TselykhAlexander N. TselykhPublished in: SIN (2013)
Keyphrases
- network security
- public safety
- user activity
- computer networks
- intrusion detection
- intrusion detection system
- risk assessment
- information sharing
- network traffic
- user behavior
- anomaly detection
- emergency response
- emergency management
- information security
- real time
- fraud detection
- decision support
- online social networks
- united states
- share information
- homeland security
- public sector
- surveillance system
- monitoring system
- data mining