Search
Data-driven model-based detection of malicious insiders via physical access logs
Cheh C., Thakore U., Fawaz A., Chen B., Temple W., Sanders W. ACM Transactions on Modeling and Computer Simulation29(4):1-25,2019.Type:Article
To:
Your Colleague's E-mail:
From:
Your E-mail:
Subject:
Reviews: Data-driven model-based detection of malicious insiders via physical access logs
Message Body:
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy