Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
  Data-driven model-based detection of malicious insiders via physical access logs
Cheh C., Thakore U., Fawaz A., Chen B., Temple W., Sanders W. ACM Transactions on Modeling and Computer Simulation29(4):1-25,2019.Type:Article
 
     
     
 
   
To:  
Your Colleague's E-mail:
   
From:  
Your E-mail:
   
Subject: Reviews: Data-driven model-based detection of malicious insiders via physical access logs
   
Message Body:
 
     
 
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy