Sign in

Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations.

Arnau ErolaIoannis AgrafiotisMichael GoldsmithSadie Creese
Published in: J. Inf. Secur. Appl. (2022)
Keyphrases
  • insider threat
  • real time
  • databases
  • anomaly detection
  • data streams
  • email
  • sensor networks