Graph-based approaches to insider threat detection

William Eberle, Lawrence B. Holder. Graph-based approaches to insider threat detection. In Frederick T. Sheldon, Greg Peterson, Axel W. Krings, Robert K. Abercrombie, Ali Mili, editors, Fifth Cyber Security and Information Intelligence Research Workshop, CSIIRW '09, Knoxville, TN, USA, April 13-15, 2009. pages 44, ACM, 2009. [doi]

@inproceedings{EberleH09-2,
  title = {Graph-based approaches to insider threat detection},
  author = {William Eberle and Lawrence B. Holder},
  year = {2009},
  doi = {10.1145/1558607.1558658},
  url = {http://doi.acm.org/10.1145/1558607.1558658},
  researchr = {https://researchr.org/publication/EberleH09-2},
  cites = {0},
  citedby = {0},
  pages = {44},
  booktitle = {Fifth Cyber Security and Information Intelligence Research Workshop, CSIIRW '09, Knoxville, TN, USA, April 13-15, 2009},
  editor = {Frederick T. Sheldon and Greg Peterson and Axel W. Krings and Robert K. Abercrombie and Ali Mili},
  publisher = {ACM},
  isbn = {978-1-60558-518-5},
}