default search action
BibTeX record conf/cics/HuFWCK11
@inproceedings{DBLP:conf/cics/HuFWCK11, author = {Yi Hu and Charles E. Frank and James Walden and Emily Crawford and Dhanuja Kasturiratna}, title = {Profiling file repository access patterns for identifying data exfiltration activities}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence in Cyber Security, {CICS} 2011, Paris, France, April 12-13, 2011}, pages = {122--128}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CICYBS.2011.5949404}, doi = {10.1109/CICYBS.2011.5949404}, timestamp = {Sun, 06 Oct 2024 20:58:06 +0200}, biburl = {https://dblp.org/rec/conf/cics/HuFWCK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.