Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data.
Gaurang GavaiKumar SricharanDave GunningJohn HanleyMudita SinghalRob RollestonPublished in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2015)