1 - 5 of 5 articles
The authors present the use of graph-based approaches to discovering anomalous instances of structural patterns in data that represent insider threat activity. The approaches presented search for activities that appear to match normal transactions, but in fact are structurally different. The...
The dearth of research on spatial analyses for installation patterns and characteristics of residential burglar alarms exists in the crime prevention literature in general, and even a few existing studies are based on observational and anthropological approaches with little quantitative...
Shrinkage continues to be a considerable cost to the retail industry, with a recent estimate suggesting that globally it could be as much as $278 billion a year. In addition, it is a problem that has proved difficult to resolve, despite billions of dollars of investment every year in new...
Security studies within higher education face many challenges. This article discusses items related to security education and research: placement of security programs within American colleges, prevalence of graduate theses and doctoral dissertations related to general security studies, graduate...
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.