Who Really Did It? Controlling Malicious Insiders by Merging Biometric Behavior with Detection and Automated Responses.
Bruce GabrielsonPublished in: HICSS (2012)
Keyphrases
- malicious behavior
- detection method
- detection rate
- insider threat
- automated analysis
- object detection
- detection algorithm
- semi automated
- false alarms
- fully automated
- abnormal behavior
- detection accuracy
- automatic detection
- false positives
- pattern recognition
- human behavior
- iris recognition
- image sequences
- anomaly detection
- video sequences