Login / Signup
Detecting Insider Threat from Enterprise Social and Online Activity Data.
Gaurang Gavai
Kumar Sricharan
Dave Gunning
Rob Rolleston
John Hanley
Mudita Singhal
Published in:
MIST@CCS (2015)
Keyphrases
</>
data sets
insider threat
database
data processing
databases
data mining techniques
data collection
real time
computer systems