Mining for insider threats in business transactions and processes.
William EberleLawrence B. HolderPublished in: CIDM (2009)
Keyphrases
- business transactions
- electronic commerce
- business processes
- insider threat
- web mining
- case study
- knowledge discovery
- sequential patterns
- data mining
- sequential pattern mining
- mining algorithm
- frequent patterns
- business process
- computational models
- frequent itemsets
- website
- cyber security
- security vulnerabilities
- social networks
- data sets