Login / Signup
Detecting Insider Threats by Monitoring System Call Activity.
Nam T. Nguyen
Peter L. Reiher
Geoffrey H. Kuenning
Published in:
IAW (2003)
Keyphrases
</>
monitoring system
insider threat
data acquisition
health monitoring
human activities
health status
control system
cyber security
field bus
real time
expert systems
data collection
vital signs