"Data mining computer audit logs to detect computer misuse."

Sharon Kay Heatley, James R. Otto (1998)

Details and statistics

DOI: 10.1002/(SICI)1099-1174(199809)7:3<125::AID-ISAF146>3.0.CO;2-L

access: closed

type: Journal Article

metadata version: 2020-08-13

a service of  Schloss Dagstuhl - Leibniz Center for Informatics