Login / Signup

Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs.

Carmen ChehBinbin ChenWilliam G. TempleWilliam H. Sanders
Published in: QEST (2017)
Keyphrases
  • data driven
  • access logs
  • access patterns
  • insider threat
  • web server
  • databases
  • co occurrence
  • response time