Llwytho...
Leveraging Social Networks to Detect Anomalous Insider Actions in Collaborative Environments
Collaborative information systems (CIS) enable users to coordinate efficiently over shared tasks. T hey are often deployed in complex dynamic systems that provide users with broad access privileges, but also leave the system vulnerable to various attacks. Techniques to detect threats originating fro...
Wedi'i Gadw mewn:
| Cyhoeddwyd yn: | ISI |
|---|---|
| Prif Awduron: | , , , |
| Fformat: | Artigo |
| Iaith: | Inglês |
| Cyhoeddwyd: |
2011
|
| Pynciau: | |
| Mynediad Ar-lein: | https://ncbi.nlm.nih.gov/pmc/articles/PMC4303584/ https://ncbi.nlm.nih.gov/pubmed/25621314 https://ncbi.nlm.nih.govhttp://dx.doi.org/10.1109/ISI.2011.5984061 |
| Tagiau: |
Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
|