Sign in

Automated Insider Threat Detection System Using User and Role-Based Profile Assessment.

Philip A. LeggOliver BuckleyMichael GoldsmithSadie Creese
Published in: IEEE Syst. J. (2017)
Keyphrases
  • communication systems
  • user profiles
  • insider threat
  • database
  • decision making
  • real time