I agree that this site is using cookies. You can find further informations
here
.
X
Login
Merkliste (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
zur Desktop-Version
Toggle navigation
Merkliste
1 Ergebnisse
1
Detecting insider threats in a real corporate database of c..:
, In:
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
,
Senator, Ted E.
;
Goldberg, Henry G.
;
Memory, Alex
... - p. 1393-1401 , 2013
Link:
https://dl.acm.org/doi/10.1145/2487575.2488213
RT T1
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
: T1
Detecting insider threats in a real corporate database of computer usage activity
UL https://suche.suub.uni-bremen.de/peid=acm-2488213&Exemplar=1&LAN=DE A1 Senator, Ted E. A1 Goldberg, Henry G. A1 Memory, Alex A1 Young, William T. A1 Rees, Brad A1 Pierce, Robert A1 Huang, Daniel A1 Reardon, Matthew A1 Bader, David A. A1 Chow, Edmond A1 Essa, Irfan A1 Jones, Joshua A1 Bettadapura, Vinay A1 Chau, Duen Horng A1 Green, Oded A1 Kaya, Oguz A1 Zakrzewska, Anita A1 Briscoe, Erica A1 Mappus, Rudolph IV L. A1 McColl, Robert A1 Weiss, Lora A1 Dietterich, Thomas G. A1 Fern, Alan A1 Wong, Weng--Keen A1 Das, Shubhomoy A1 Emmott, Andrew A1 Irvine, Jed A1 Lee, Jay-Yoon A1 Koutra, Danai A1 Faloutsos, Christos A1 Corkill, Daniel A1 Friedland, Lisa A1 Gentzel, Amanda A1 Jensen, David PB ACM YR 2013 K1 anomaly detection K1 insider threat K1 Information systems K1 Information systems applications K1 Data mining SP 1393 OP 1401 LK http://dx.doi.org/https://dl.acm.org/doi/10.1145/2487575.2488213 DO https://dl.acm.org/doi/10.1145/2487575.2488213 SF ELIB - SuUB Bremen
Export
RefWorks (nur Desktop-Version!)
Flow
(Zuerst in
Flow
einloggen, dann importieren)