Login / Signup

Uncovering insider threats from the digital footprints of individuals.

Anni CodenW. Sabrina LinKeith HouckMichael A. TanenblattJeff BostonJulie MacNaughtDanny SorokerJustin D. WeiszShimei PanJui-Hsin LaiJie LuSteve WoodYinglong XiaChing-Yung Lin
Published in: IBM J. Res. Dev. (2016)
Keyphrases
  • insider threat
  • information security
  • computer security
  • countermeasures
  • databases
  • case study
  • social network analysis