Login / Signup
A Graph Based Framework for Malicious Insider Threat Detection.
Anagi Gamachchi
Li Sun
Serdar Boztas
Published in:
CoRR (2018)
Keyphrases
</>
insider threat
insider attacks
email
malicious activities
security architecture
critical infrastructure
data leakage prevention
data streams
database
data sets
information systems
data analysis
wireless sensor networks
anomaly detection