Login / Signup
Detecting Unknown Insider Threat Scenarios.
William T. Young
Alex Memory
Henry G. Goldberg
Ted E. Senator
Published in:
IEEE Symposium on Security and Privacy Workshops (2014)
Keyphrases
</>
insider threat
malicious activities
email
security architecture
decision making
database systems
data streams
computational intelligence
data leakage prevention