Learning from Access Log to Mitigate Insider Threats

As the quantity of data collected, stored, and processed in information systems has grown, so too have insider threats. This type of threat is realized when authorized individuals misuse their privileges to violate privacy or security policies. Over the past several decades, various technologies hav...

Full description

Bibliographic Details
Main Author: Zhang, Wen
Other Authors: Carl Gunter
Format: Others
Language:en
Published: VANDERBILT 2016
Subjects:
Online Access:http://etd.library.vanderbilt.edu/available/etd-03152016-201532/