Date: 2013-06-03 22:19:16Data mining Anomaly detection Data security Networks Machine learning Community structure Supervised learning Anomaly Graph drawing Local outlier factor Shortest path problem Outlier | | Detecting Insider Threats in a Real Corporate Database of Computer Usage Activity Ted E. Senator, Henry G. David A.Bader, Edmond Chow, Thomas G. Dietterich, Alan Goldberg, Alex Memory, Irfan Essa, Joshua Jones,Add to Reading ListSource URL: www.cc.gatech.eduDownload Document from Source Website File Size: 1,18 MBShare Document on Facebook
|