Login / Signup

Using Internet Activity Profiling for Insider-threat Detection.

Bushra A. AlAhmadiPhilip A. LeggJason R. C. Nurse
Published in: ICEIS (2) (2015)
Keyphrases
  • insider threat
  • email
  • data sets
  • databases
  • decision making
  • wireless sensor networks
  • anomaly detection
  • human activities
  • computer networks
  • risk management
  • security mechanisms