Login / Signup
Tracing Sources of Anonymous Slow Suspicious Activities.
Harsha K. Kalutarage
Siraj A. Shaikh
Qin Zhou
Anne E. James
Published in:
NSS (2013)
Keyphrases
</>
information sources
anomaly detection
data sets
human activities
databases
activity recognition
data sources
knowledge sources
daily life
team members
collaborative activities
malicious activities
website
information retrieval
real world
learning scenarios
coordination mechanism
detecting malicious