Sign in

VAST 2009 challenge: An insider threat.

Georges G. GrinsteinJean ScholtzMark A. WhitingCatherine Plaisant
Published in: IEEE VAST (2009)
Keyphrases
  • insider threat
  • email
  • security architecture
  • data leakage prevention
  • real time
  • data mining