Login / Signup

Detecting Unknown Insider Threat Scenarios.

William T. YoungAlex MemoryHenry G. GoldbergTed E. Senator
Published in: IEEE Symposium on Security and Privacy Workshops (2014)
Keyphrases
  • insider threat
  • malicious activities
  • email
  • security architecture
  • decision making
  • database systems
  • data streams
  • computational intelligence
  • data leakage prevention