Login / Signup

Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis.

Peter J. BestPall RikhardssonMark Toleman
Published in: J. Digit. Forensics Secur. Law (2009)
Keyphrases
  • fraud detection
  • enterprise systems
  • network intrusion detection
  • data sets
  • counter terrorism
  • database
  • information retrieval
  • data mining techniques
  • intrusion detection