Authors
Brian Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos Keromytis, Salvatore Stolfo
Publication date
2009/8/21
Journal
IEEE security & privacy
Volume
7
Issue
6
Pages
22-29
Publisher
IEEE
Description
Insider attacks-that is, attacks by users with privileged knowledge about a system-are a growing problem for many organizations. To address this threat, the authors have designed an architecture for insider threat detection that combines an array of complementary monitoring and auditing techniques.
Total citations
201020112012201320142015201620172018201920202021202220232024713106131510514814343
Scholar articles
B Bowen, MB Salem, S Hershkop, A Keromytis, S Stolfo - IEEE security & privacy, 2009