Login / Signup
Using Internet Activity Profiling for Insider-threat Detection.
Bushra A. AlAhmadi
Philip A. Legg
Jason R. C. Nurse
Published in:
ICEIS (2) (2015)
Keyphrases
</>
insider threat
email
data sets
databases
decision making
wireless sensor networks
anomaly detection
human activities
computer networks
risk management
security mechanisms