Simulating Malicious Insiders in Real Host-Monitored User Data.
Kurt C. WallnauBrian LindauerMichael TheisRobert S. DurstTerrance G. ChampionEric RenoufChristian PetersenPublished in: CSET (2014)
Keyphrases
- data collection
- data sets
- image data
- high quality
- data analysis
- raw data
- user defined
- data distribution
- data processing
- knowledge discovery
- original data
- small number
- synthetic data
- statistical analysis
- missing data
- log files
- human subjects
- database
- end users
- data sources
- prior knowledge
- training data
- databases
- data mining techniques
- data points
- experimental data
- website
- log data