Learning from Access Log to Mitigate Insider Threats
As the quantity of data collected, stored, and processed in information systems has grown, so too have insider threats. This type of threat is realized when authorized individuals misuse their privileges to violate privacy or security policies. Over the past several decades, various technologies hav...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en |
Published: |
VANDERBILT
2016
|
Subjects: | |
Online Access: | http://etd.library.vanderbilt.edu/available/etd-03152016-201532/ |