Login / Signup

TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.

Athul HarilalFlavio ToffaliniJohn Henry CastellanosJuan GuarnizoIvan HomoliakMartín Ochoa
Published in: MIST@CCS (2017)
Keyphrases
  • insider threat
  • insider attacks
  • email
  • malicious activities
  • security architecture
  • data leakage prevention
  • data streams
  • critical infrastructure
  • database
  • low cost
  • intrusion detection system
  • control system