Login / Signup

The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.

Athul HarilalFlavio ToffaliniIvan HomoliakJohn Henry CastellanosJuan GuarnizoSoumik MondalMartín Ochoa
Published in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2018)
Keyphrases
  • insider threat
  • insider attacks
  • email
  • malicious activities
  • security architecture
  • data streams
  • data leakage prevention
  • database
  • real time
  • critical infrastructure