Login / Signup

Detecting Insider Threat from Enterprise Social and Online Activity Data.

Gaurang GavaiKumar SricharanDave GunningRob RollestonJohn HanleyMudita Singhal
Published in: MIST@CCS (2015)
Keyphrases
  • data sets
  • insider threat
  • database
  • data processing
  • databases
  • data mining techniques
  • data collection
  • real time
  • computer systems