Login / Signup
Using empirical insider threat case data to design a mitigation strategy.
Dawn M. Cappelli
Published in:
Insider Threats@CCS (2010)
Keyphrases
</>
data sets
data analysis
insider threat
data mining techniques
database
real time
data mining
knowledge discovery
data processing
data acquisition
data collection