Detecting insider threats in a real corporate database of computer usage activity.
Ted E. SenatorHenry G. GoldbergAlex MemoryWilliam T. YoungBrad ReesRobert PierceDaniel HuangMatthew ReardonDavid A. BaderEdmond ChowIrfan A. EssaJoshua JonesVinay BettadapuraDuen Horng ChauOded GreenOguz KayaAnita ZakrzewskaErica BriscoeRudolph L. Mappus IVRobert McCollLora WeissThomas G. DietterichAlan FernWeng-Keen WongShubhomoy DasAndrew EmmottJed IrvineJay Yoon LeeDanai KoutraChristos FaloutsosDaniel D. CorkillLisa FriedlandAmanda GentzelDavid D. JensenPublished in: KDD (2013)