|
ComputingReviews.com
|
Data-driven model-based detection of malicious insiders via physical access logs Cheh C., Thakore U., Fawaz A., Chen B., Temple W., Sanders W. ACM Transactions on Modeling and Computer Simulation29(4):1-25,2019.Type:Article |
|
|
|
Published By: ACM Press |
|
|
|
|
|
|
|
|
Use your personal or institutional subscription to read the fulltext of the article.
|
|
|
|
|
|
|
|
|
|
|
|