메뉴 건너뛰기




Volumn , Issue , 2005, Pages 353-354

On off-topic access detection in information systems

Author keywords

Detection; Insider threat; Misuse; Security; Unauthorized access

Indexed keywords

DETECTION; INSIDER THREAT; MISUSE; SECURITY; UNAUTHORIZED ACCESS;

EID: 33745772463     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1099554.1099663     Document Type: Conference Paper
Times cited : (6)

References (6)
  • 3
    • 33745801620 scopus 로고    scopus 로고
    • Detecting misuse of information retrieval systems using data mining techniques
    • N. Goharian, et al: Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques. IEEE Intelligence and Security Informatics (ISI), 2005.
    • (2005) IEEE Intelligence and Security Informatics (ISI)
    • Goharian, N.1
  • 4
    • 33644516260 scopus 로고    scopus 로고
    • Query length impact on misuse detection in information retrieval systems
    • version appeared
    • N. Goharian, L. Ma: Query Length Impact on Misuse Detection in Information Retrieval Systems. http://ir.iit.edu/publications/downloads/SAC05- 0040.pdf (version appeared in ACM Symposium on Applied Computing (SAC), 2005).
    • (2005) ACM Symposium on Applied Computing (SAC)
    • Goharian, N.1    Ma, L.2
  • 6
    • 33751058215 scopus 로고    scopus 로고
    • Leveraging one-class SVM and semantic analysis to detect anomalous content
    • O. Yilmazel, et al: Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content. IEEE Intelligence and Security Informatics (ISI), 2005.
    • (2005) IEEE Intelligence and Security Informatics (ISI)
    • Yilmazel, O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.