Matches in DBpedia 2016-04 for { <http://blogs.computerworld.com/19382/sifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_threats> ?p ?o }
Showing triples 1 to 9 of
9
with 100 triples per page.
- sifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_threats accessdate "2011-12-06".
- sifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_threats date "2011-12-06".
- sifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_threats first "Darlene".
- sifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_threats isCitedBy Georgia_Institute_of_Technology_College_of_Computing.
- sifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_threats isCitedBy Proactive_Discovery_of_Insider_Threats_Using_Graph_Analysis_and_Learning.
- sifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_threats last "Storm".
- sifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_threats title "Sifting through petabytes: PRODIGAL monitoring for lone wolf insider threats".
- sifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_threats url "http://blogs.computerworld.com/19382/sifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_threats".
- sifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_threats work Computer_World.