Graph Mining for Insider Threat Detection
暂无分享,去创建一个
Satyen Abrol | Raymond Heatherly | Murat Kantarcioglu | Vaibhav Khadilkar | Latifur Khan | Bhavani Thuraisingham | Murat Kantarcioglu | B. Thuraisingham | L. Khan | R. Heatherly | Satyen Abrol | V. Khadilkar
[1] Bhavani M. Thuraisingham,et al. Classification and Novel Class Detection of Data Streams in a Dynamic Feature Space , 2010, ECML/PKDD.
[2] Latifur Khan,et al. SISC: A Text Classification Approach Using Semi Supervised Subspace Clustering , 2009, 2009 IEEE International Conference on Data Mining Workshops.
[3] Lawrence B. Holder,et al. Applying graph-based anomaly detection approaches to the discovery of insider threats , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.
[4] Bhavani M. Thuraisingham,et al. A semantic web based framework for social network access control , 2009, SACMAT '09.
[5] Michael W. Berry,et al. Algorithms and applications for approximate nonnegative matrix factorization , 2007, Comput. Stat. Data Anal..
[6] Lawrence B. Holder,et al. Mining Graph Data: Cook/Mining Graph Data , 2006 .