Insider Threat Detection Using Microsoft Event Viewer Log Files

Michelle C. Krug

Abstract