Login / Signup
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier.
Adam James Hall
Nikolaos Pitropakis
William J. Buchanan
Naghmeh Moradpoor
Published in:
CoRR (2019)
Keyphrases
</>
insider threat
data sets
data collection
data processing
database
data sources
data mining
social networks
data analysis
information technology
low cost
social network analysis
statistical methods
smart card