Login / Signup
TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
Athul Harilal
Flavio Toffalini
John Henry Castellanos
Juan Guarnizo
Ivan Homoliak
Martín Ochoa
Published in:
MIST@CCS (2017)
Keyphrases
</>
insider threat
insider attacks
email
malicious activities
security architecture
data leakage prevention
data streams
critical infrastructure
database
low cost
intrusion detection system
control system