Login / Signup
Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis.
Peter J. Best
Pall Rikhardsson
Mark Toleman
Published in:
J. Digit. Forensics Secur. Law (2009)
Keyphrases
</>
fraud detection
enterprise systems
network intrusion detection
data sets
counter terrorism
database
information retrieval
data mining techniques
intrusion detection