Articles with "internal intrusion" as a keyword



Photo from wikipedia

An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2015.2418434

Abstract: Currently, most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with coworkers and request these coworkers to assist co-tasks, thereby making the… read more here.

Keywords: detection protection; intrusion detection; system; internal intrusion ... See more keywords