acm-header
Sign In

Communications of the ACM

BLOG@CACM


Refine your search:
dateMore Than a Year Ago
authorAlex Vakulov
bg-corner

Is It Difficult to Bypass the Protection That Uses Big Data?
From BLOG@CACM

Is It Difficult to Bypass the Protection That Uses Big Data?

Big data analytics systems identify signs of unauthorized activity in vast arrays of structured and unstructured data.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account