Login / Signup
Explaining and Aggregating Anomalies to Detect Insider Threats.
Henry G. Goldberg
William T. Young
Alex Memory
Ted E. Senator
Published in:
HICSS (2016)
Keyphrases
</>
anomaly detection
insider threat
detection method
abnormal behavior
automatic detection
detect anomalies
databases
detection algorithm
data mining
complex background
denial of service attacks
anomalous behavior
network attacks