Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs
License:
Creative Commons 2.5 PDF document
- 480.53 KB
- 12 downloads
- Download
- PDF version
- Printer-friendly version