Search For:

Displaying 1-2 out of 2 total
Use of Domain Knowledge to Detect Insider Threats in Computer Activities
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By William T. Young,Henry G. Goldberg,Alex Memory,James F. Sartain,Ted E. Senator
Issue Date:May 2013
pp. 60-67
This paper reports the first set of results from a comprehensive set of experiments to detect realistic insider threat instances in a real corporate database of computer usage activity. It focuses on the application of domain knowledge to provide starting ...
   
Relational data pre-processing techniques for improved securities fraud detection
Found in: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '07)
By Andrew Fast, Brian Taylor, David Jensen, Henry G. Goldberg, John Komoroske, Lisa Friedland, Marc Maier
Issue Date:August 2007
pp. 941-949
Commercial datasets are often large, relational, and dynamic. They contain many records of people, places, things, events and their interactions over time. Such datasets are rarely structured appropriately for knowledge discovery, and they often contain va...
     
 1