|
Volumn , Issue , 2003, Pages 45-52
|
Detecting insider threats by monitoring system call activity
|
Author keywords
Companies; Computer science; Computer security; Computerized monitoring; Data mining; File systems; Intrusion detection; System testing; Telecommunication traffic; Watches
|
Indexed keywords
COMPUTER SCIENCE;
CYBERNETICS;
DATA MINING;
FILE ORGANIZATION;
INDUSTRY;
INTRUSION DETECTION;
SECURITY OF DATA;
TELECOMMUNICATION TRAFFIC;
WATCHES;
EXPERIMENTAL SYSTEM;
FILE SYSTEMS;
INSIDER THREAT;
MONITOR SYSTEM;
MONITORING SYSTEM;
RELATED SYSTEMS;
SYSTEM TESTING;
UNUSUAL BEHAVIORS;
MONITORING;
|
EID: 84946410215
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/SMCSIA.2003.1232400 Document Type: Conference Paper |
Times cited : (92)
|
References (12)
|