Back to Results
First PageMeta Content
Data mining / Anomaly detection / Data security / Networks / Machine learning / Community structure / Supervised learning / Anomaly / Graph drawing / Local outlier factor / Shortest path problem / Outlier


Detecting Insider Threats in a Real Corporate Database of Computer Usage Activity Ted E. Senator, Henry G. David A.Bader, Edmond Chow, Thomas G. Dietterich, Alan Goldberg, Alex Memory, Irfan Essa, Joshua Jones,
Add to Reading List

Document Date: 2013-06-03 22:19:16


Open Document

File Size: 1,18 MB

Share Result on Facebook