Detecting insider threats in a real corporate database of computer usage activity. Senator, T. E., Goldberg, H. G., Memory, A., Young, W. T., Rees, B., Pierce, R., Huang, D., Reardon, M., Bader, D. A., Chow, E., Essa, I. A., Jones, J., Bettadapura, V., Chau, D. H., Green, O., Kaya, O., Zakrzewska, A., Briscoe, E., IV, R. L. M., McColl, R., Weiss, L., Dietterich, T. G., Fern, A., Wong, W., Das, S., Emmott, A., Irvine, J., Lee, J. Y., Koutra, D., Faloutsos, C., Corkill, D. D., Friedland, L., Gentzel, A., & Jensen, D. D. In Dhillon, I. S., Koren, Y., Ghani, R., Senator, T. E., Bradley, P., Parekh, R., He, J., Grossman, R. L., & Uthurusamy, R., editors, The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2013, Chicago, IL, USA, August 11-14, 2013, pages 1393–1401, 2013. ACM.
Paper doi bibtex @inproceedings{DBLP:conf/kdd/SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ13,
author = {Ted E. Senator and
Henry G. Goldberg and
Alex Memory and
William T. Young and
Brad Rees and
Robert Pierce and
Daniel Huang and
Matthew Reardon and
David A. Bader and
Edmond Chow and
Irfan A. Essa and
Joshua Jones and
Vinay Bettadapura and
Duen Horng Chau and
Oded Green and
Oguz Kaya and
Anita Zakrzewska and
Erica Briscoe and
Rudolph L. Mappus IV and
Robert McColl and
Lora Weiss and
Thomas G. Dietterich and
Alan Fern and
Weng{-}Keen Wong and
Shubhomoy Das and
Andrew Emmott and
Jed Irvine and
Jay Yoon Lee and
Danai Koutra and
Christos Faloutsos and
Daniel D. Corkill and
Lisa Friedland and
Amanda Gentzel and
David D. Jensen},
editor = {Inderjit S. Dhillon and
Yehuda Koren and
Rayid Ghani and
Ted E. Senator and
Paul Bradley and
Rajesh Parekh and
Jingrui He and
Robert L. Grossman and
Ramasamy Uthurusamy},
title = {Detecting insider threats in a real corporate database of computer
usage activity},
booktitle = {The 19th {ACM} {SIGKDD} International Conference on Knowledge Discovery
and Data Mining, {KDD} 2013, Chicago, IL, USA, August 11-14, 2013},
pages = {1393--1401},
publisher = {{ACM}},
year = {2013},
url = {https://doi.org/10.1145/2487575.2488213},
doi = {10.1145/2487575.2488213},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/kdd/SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"PBg32LwLwBwWRiNxG","bibbaseid":"senator-goldberg-memory-young-rees-pierce-huang-reardon-etal-detectinginsiderthreatsinarealcorporatedatabaseofcomputerusageactivity-2013","author_short":["Senator, T. E.","Goldberg, H. G.","Memory, A.","Young, W. T.","Rees, B.","Pierce, R.","Huang, D.","Reardon, M.","Bader, D. A.","Chow, E.","Essa, I. A.","Jones, J.","Bettadapura, V.","Chau, D. H.","Green, O.","Kaya, O.","Zakrzewska, A.","Briscoe, E.","IV, R. L. M.","McColl, R.","Weiss, L.","Dietterich, T. G.","Fern, A.","Wong, W.","Das, S.","Emmott, A.","Irvine, J.","Lee, J. Y.","Koutra, D.","Faloutsos, C.","Corkill, D. D.","Friedland, L.","Gentzel, A.","Jensen, D. D."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Ted","E."],"propositions":[],"lastnames":["Senator"],"suffixes":[]},{"firstnames":["Henry","G."],"propositions":[],"lastnames":["Goldberg"],"suffixes":[]},{"firstnames":["Alex"],"propositions":[],"lastnames":["Memory"],"suffixes":[]},{"firstnames":["William","T."],"propositions":[],"lastnames":["Young"],"suffixes":[]},{"firstnames":["Brad"],"propositions":[],"lastnames":["Rees"],"suffixes":[]},{"firstnames":["Robert"],"propositions":[],"lastnames":["Pierce"],"suffixes":[]},{"firstnames":["Daniel"],"propositions":[],"lastnames":["Huang"],"suffixes":[]},{"firstnames":["Matthew"],"propositions":[],"lastnames":["Reardon"],"suffixes":[]},{"firstnames":["David","A."],"propositions":[],"lastnames":["Bader"],"suffixes":[]},{"firstnames":["Edmond"],"propositions":[],"lastnames":["Chow"],"suffixes":[]},{"firstnames":["Irfan","A."],"propositions":[],"lastnames":["Essa"],"suffixes":[]},{"firstnames":["Joshua"],"propositions":[],"lastnames":["Jones"],"suffixes":[]},{"firstnames":["Vinay"],"propositions":[],"lastnames":["Bettadapura"],"suffixes":[]},{"firstnames":["Duen","Horng"],"propositions":[],"lastnames":["Chau"],"suffixes":[]},{"firstnames":["Oded"],"propositions":[],"lastnames":["Green"],"suffixes":[]},{"firstnames":["Oguz"],"propositions":[],"lastnames":["Kaya"],"suffixes":[]},{"firstnames":["Anita"],"propositions":[],"lastnames":["Zakrzewska"],"suffixes":[]},{"firstnames":["Erica"],"propositions":[],"lastnames":["Briscoe"],"suffixes":[]},{"firstnames":["Rudolph","L.","Mappus"],"propositions":[],"lastnames":["IV"],"suffixes":[]},{"firstnames":["Robert"],"propositions":[],"lastnames":["McColl"],"suffixes":[]},{"firstnames":["Lora"],"propositions":[],"lastnames":["Weiss"],"suffixes":[]},{"firstnames":["Thomas","G."],"propositions":[],"lastnames":["Dietterich"],"suffixes":[]},{"firstnames":["Alan"],"propositions":[],"lastnames":["Fern"],"suffixes":[]},{"firstnames":["Weng-Keen"],"propositions":[],"lastnames":["Wong"],"suffixes":[]},{"firstnames":["Shubhomoy"],"propositions":[],"lastnames":["Das"],"suffixes":[]},{"firstnames":["Andrew"],"propositions":[],"lastnames":["Emmott"],"suffixes":[]},{"firstnames":["Jed"],"propositions":[],"lastnames":["Irvine"],"suffixes":[]},{"firstnames":["Jay","Yoon"],"propositions":[],"lastnames":["Lee"],"suffixes":[]},{"firstnames":["Danai"],"propositions":[],"lastnames":["Koutra"],"suffixes":[]},{"firstnames":["Christos"],"propositions":[],"lastnames":["Faloutsos"],"suffixes":[]},{"firstnames":["Daniel","D."],"propositions":[],"lastnames":["Corkill"],"suffixes":[]},{"firstnames":["Lisa"],"propositions":[],"lastnames":["Friedland"],"suffixes":[]},{"firstnames":["Amanda"],"propositions":[],"lastnames":["Gentzel"],"suffixes":[]},{"firstnames":["David","D."],"propositions":[],"lastnames":["Jensen"],"suffixes":[]}],"editor":[{"firstnames":["Inderjit","S."],"propositions":[],"lastnames":["Dhillon"],"suffixes":[]},{"firstnames":["Yehuda"],"propositions":[],"lastnames":["Koren"],"suffixes":[]},{"firstnames":["Rayid"],"propositions":[],"lastnames":["Ghani"],"suffixes":[]},{"firstnames":["Ted","E."],"propositions":[],"lastnames":["Senator"],"suffixes":[]},{"firstnames":["Paul"],"propositions":[],"lastnames":["Bradley"],"suffixes":[]},{"firstnames":["Rajesh"],"propositions":[],"lastnames":["Parekh"],"suffixes":[]},{"firstnames":["Jingrui"],"propositions":[],"lastnames":["He"],"suffixes":[]},{"firstnames":["Robert","L."],"propositions":[],"lastnames":["Grossman"],"suffixes":[]},{"firstnames":["Ramasamy"],"propositions":[],"lastnames":["Uthurusamy"],"suffixes":[]}],"title":"Detecting insider threats in a real corporate database of computer usage activity","booktitle":"The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2013, Chicago, IL, USA, August 11-14, 2013","pages":"1393–1401","publisher":"ACM","year":"2013","url":"https://doi.org/10.1145/2487575.2488213","doi":"10.1145/2487575.2488213","timestamp":"Mon, 03 Mar 2025 00:00:00 +0100","biburl":"https://dblp.org/rec/conf/kdd/SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ13.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/kdd/SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ13,\n author = {Ted E. Senator and\n Henry G. Goldberg and\n Alex Memory and\n William T. Young and\n Brad Rees and\n Robert Pierce and\n Daniel Huang and\n Matthew Reardon and\n David A. Bader and\n Edmond Chow and\n Irfan A. Essa and\n Joshua Jones and\n Vinay Bettadapura and\n Duen Horng Chau and\n Oded Green and\n Oguz Kaya and\n Anita Zakrzewska and\n Erica Briscoe and\n Rudolph L. Mappus IV and\n Robert McColl and\n Lora Weiss and\n Thomas G. Dietterich and\n Alan Fern and\n Weng{-}Keen Wong and\n Shubhomoy Das and\n Andrew Emmott and\n Jed Irvine and\n Jay Yoon Lee and\n Danai Koutra and\n Christos Faloutsos and\n Daniel D. Corkill and\n Lisa Friedland and\n Amanda Gentzel and\n David D. Jensen},\n editor = {Inderjit S. Dhillon and\n Yehuda Koren and\n Rayid Ghani and\n Ted E. Senator and\n Paul Bradley and\n Rajesh Parekh and\n Jingrui He and\n Robert L. Grossman and\n Ramasamy Uthurusamy},\n title = {Detecting insider threats in a real corporate database of computer\n usage activity},\n booktitle = {The 19th {ACM} {SIGKDD} International Conference on Knowledge Discovery\n and Data Mining, {KDD} 2013, Chicago, IL, USA, August 11-14, 2013},\n pages = {1393--1401},\n publisher = {{ACM}},\n year = {2013},\n url = {https://doi.org/10.1145/2487575.2488213},\n doi = {10.1145/2487575.2488213},\n timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/kdd/SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ13.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Senator, T. E.","Goldberg, H. G.","Memory, A.","Young, W. T.","Rees, B.","Pierce, R.","Huang, D.","Reardon, M.","Bader, D. A.","Chow, E.","Essa, I. A.","Jones, J.","Bettadapura, V.","Chau, D. H.","Green, O.","Kaya, O.","Zakrzewska, A.","Briscoe, E.","IV, R. L. M.","McColl, R.","Weiss, L.","Dietterich, T. G.","Fern, A.","Wong, W.","Das, S.","Emmott, A.","Irvine, J.","Lee, J. Y.","Koutra, D.","Faloutsos, C.","Corkill, D. D.","Friedland, L.","Gentzel, A.","Jensen, D. D."],"editor_short":["Dhillon, I. S.","Koren, Y.","Ghani, R.","Senator, T. E.","Bradley, P.","Parekh, R.","He, J.","Grossman, R. L.","Uthurusamy, R."],"key":"DBLP:conf/kdd/SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ13","id":"DBLP:conf/kdd/SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ13","bibbaseid":"senator-goldberg-memory-young-rees-pierce-huang-reardon-etal-detectinginsiderthreatsinarealcorporatedatabaseofcomputerusageactivity-2013","role":"author","urls":{"Paper":"https://doi.org/10.1145/2487575.2488213"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/f/CFaloutsos.bib","dataSources":["zM4wMHSu34vjmb6Cm"],"keywords":[],"search_terms":["detecting","insider","threats","real","corporate","database","computer","usage","activity","senator","goldberg","memory","young","rees","pierce","huang","reardon","bader","chow","essa","jones","bettadapura","chau","green","kaya","zakrzewska","briscoe","iv","mccoll","weiss","dietterich","fern","wong","das","emmott","irvine","lee","koutra","faloutsos","corkill","friedland","gentzel","jensen"],"title":"Detecting insider threats in a real corporate database of computer usage activity","year":2013}