Login / Signup
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations.
Arnau Erola
Ioannis Agrafiotis
Michael Goldsmith
Sadie Creese
Published in:
J. Inf. Secur. Appl. (2022)
Keyphrases
</>
insider threat
real time
databases
anomaly detection
data streams
email
sensor networks