Login / Signup
Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs.
Carmen Cheh
Binbin Chen
William G. Temple
William H. Sanders
Published in:
QEST (2017)
Keyphrases
</>
data driven
access logs
access patterns
insider threat
web server
databases
co occurrence
response time