Login / Signup
Identifying and Visualizing the Malicious Insider Threat Using Bipartite Graphs.
Kara Nance
Raffael Marty
Published in:
HICSS (2011)
Keyphrases
</>
insider threat
bipartite graph
insider attacks
maximum matching
malicious activities
email
security architecture
link prediction
data streams
data leakage prevention
maximum cardinality
information systems
social network analysis
intrusion detection system
security policies
critical infrastructure