Login / Signup
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment.
Philip A. Legg
Oliver Buckley
Michael Goldsmith
Sadie Creese
Published in:
IEEE Syst. J. (2017)
Keyphrases
</>
communication systems
user profiles
insider threat
database
decision making
real time