Using Author Topic to Detect Insider Threats from Email Traffic [conference abstract]
Document Type
Conference Proceeding
Publication Date
2006
Source Publication
International Conference and Security Informatics, ISI 2006. LNCS 3975
Recommended Citation
Okolica, J.S., Peterson, G.L., Mills, R.F. (2006). Using Author Topic to Detect Insider Threats from Email Traffic. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_71
COinS
Comments
© 2006 Springer-Verlag Berlin Heidelberg
This work is an extended abstract published by Springer as cited below, in volume 3975 of Lecture Notes in Computer Science.
The "Link to Full Text" on this page opens a read-only view of the extended abstract, furnished through the SpringerNature SharedIt content-sharing initiative.
This research was also published as a 2007 article in Digital Investigation. See: https://scholar.afit.edu/facpub/1160/