Login / Signup

Using empirical insider threat case data to design a mitigation strategy.

Dawn M. Cappelli
Published in: Insider Threats@CCS (2010)
Keyphrases
  • data sets
  • data analysis
  • insider threat
  • data mining techniques
  • database
  • real time
  • data mining
  • knowledge discovery
  • data processing
  • data acquisition
  • data collection