Login / Signup

Towards insider threat detection using web server logs.

Justin MyersMichael R. GrimailaRobert F. Mills
Published in: CSIIRW (2009)
Keyphrases
  • insider threat
  • web server logs
  • information systems
  • access patterns
  • data streams
  • web server
  • data sets
  • response time
  • distributed systems