Login / Signup
Towards insider threat detection using web server logs.
Justin Myers
Michael R. Grimaila
Robert F. Mills
Published in:
CSIIRW (2009)
Keyphrases
</>
insider threat
web server logs
information systems
access patterns
data streams
web server
data sets
response time
distributed systems