Integrated user activity monitoring for regulatory services
暂无分享,去创建一个
Daniela Rosu | Kumar Bhaskaran | Mattias Marder | Jim Laredo | Yaoping Ruan | Paul Driscoll | Milton Hernandez | Alan Skinner
[1] Jeffrey M. Stanton,et al. Analysis of end user security behaviors , 2005, Comput. Secur..
[2] E. Eugene Schultz. A framework for understanding and predicting insider attacks , 2002, Comput. Secur..
[3] Karen Kent,et al. Guide to Computer Security Log Management , 2006 .
[4] T.F. Lunt,et al. Real-time intrusion detection , 1989, Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage.