Login / Signup

Insider Threat Identification by Process Analysis.

Matt BishopHeather M. ConboyHuong PhanBorislava I. SimidchievaGeorge S. AvruninLori A. ClarkeLeon J. OsterweilSean Peisert
Published in: IEEE Symposium on Security and Privacy Workshops (2014)
Keyphrases
  • data analysis
  • data acquisition
  • information systems