Authors
Brian Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos Keromytis, Salvatore Stolfo
Publication date
2009/8/21
Journal
IEEE security & privacy
Volume
7
Issue
6
Pages
22-29
Publisher
IEEE
Description
Insider attacks-that is, attacks by users with privileged knowledge about a system-are a growing problem for many organizations. To address this threat, the authors have designed an architecture for insider threat detection that combines an array of complementary monitoring and auditing techniques.
Total citations
20102011201220132014201520162017201820192020202120222023202471496131510514814342
Scholar articles
B Bowen, MB Salem, S Hershkop, A Keromytis, S Stolfo - IEEE security & privacy, 2009