Inproceedings,

Applying graph-based anomaly detection approaches to the discovery of insider threats.

, and .
ISI, page 206-208. IEEE, (2009)

Meta data

Tags

Users

  • @ans
  • @dblp

Comments and Reviews