Login / Signup

Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data.

Gaurang GavaiKumar SricharanDave GunningJohn HanleyMudita SinghalRob Rolleston
Published in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2015)
Keyphrases
  • data sets
  • database
  • training data
  • insider threat
  • prior knowledge
  • data sources
  • data collection
  • unsupervised methods
  • knowledge discovery
  • social networks
  • information systems
  • data analysis
  • learning algorithm