Login / Signup
Visualizing the insider threat: challenges and tools for identifying malicious user activity.
Philip A. Legg
Published in:
VizSEC (2015)
Keyphrases
</>
recommender systems
insider threat
user activity
malicious activities
email
online social networks
user behavior
security architecture
end users
visual analytics
information visualization
databases
social networks
data streams
interactive visualization