Sign in

Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence.

Aniello CastiglioneArcangelo CastiglioneAlfredo De SantisBarbara MasucciFrancesco PalmieriRaffaele Pizzolante
Published in: MIST@CCS (2015)
Keyphrases
  • insider threat
  • email
  • security architecture
  • information systems
  • data mining
  • social networks
  • database management systems