default search action
BibTeX record conf/kdd/SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ13
@inproceedings{DBLP:conf/kdd/SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ13, author = {Ted E. Senator and Henry G. Goldberg and Alex Memory and William T. Young and Brad Rees and Robert Pierce and Daniel Huang and Matthew Reardon and David A. Bader and Edmond Chow and Irfan A. Essa and Joshua Jones and Vinay Bettadapura and Duen Horng Chau and Oded Green and Oguz Kaya and Anita Zakrzewska and Erica Briscoe and Rudolph L. Mappus IV and Robert McColl and Lora Weiss and Thomas G. Dietterich and Alan Fern and Weng{-}Keen Wong and Shubhomoy Das and Andrew Emmott and Jed Irvine and Jay Yoon Lee and Danai Koutra and Christos Faloutsos and Daniel D. Corkill and Lisa Friedland and Amanda Gentzel and David D. Jensen}, editor = {Inderjit S. Dhillon and Yehuda Koren and Rayid Ghani and Ted E. Senator and Paul Bradley and Rajesh Parekh and Jingrui He and Robert L. Grossman and Ramasamy Uthurusamy}, title = {Detecting insider threats in a real corporate database of computer usage activity}, booktitle = {The 19th {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, {KDD} 2013, Chicago, IL, USA, August 11-14, 2013}, pages = {1393--1401}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487575.2488213}, doi = {10.1145/2487575.2488213}, timestamp = {Sun, 02 Oct 2022 16:10:57 +0200}, biburl = {https://dblp.org/rec/conf/kdd/SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.