Sign in

Detecting insider threats in a real corporate database of computer usage activity.

Ted E. SenatorHenry G. GoldbergAlex MemoryWilliam T. YoungBrad ReesRobert PierceDaniel HuangMatthew ReardonDavid A. BaderEdmond ChowIrfan A. EssaJoshua JonesVinay BettadapuraDuen Horng ChauOded GreenOguz KayaAnita ZakrzewskaErica BriscoeRudolph L. Mappus IVRobert McCollLora WeissThomas G. DietterichAlan FernWeng-Keen WongShubhomoy DasAndrew EmmottJed IrvineJay Yoon LeeDanai KoutraChristos FaloutsosDaniel D. CorkillLisa FriedlandAmanda GentzelDavid D. Jensen
Published in: KDD (2013)
Keyphrases
  • computer systems
  • computer usage
  • databases
  • information systems
  • information security
  • sensitive data
  • case study
  • data management
  • attitudes toward
  • insider threat