Travelled to:
1 × USA
Collaborated with:
T.E.Senator H.G.Goldberg A.Memory W.T.Young B.Rees R.Pierce D.Huang M.Reardon D.A.Bader E.Chow I.A.Essa J.Jones V.Bettadapura D.H.Chau O.Green O.Kaya A.Zakrzewska E.Briscoe R.L.M.IV R.McColl L.Weiss T.G.Dietterich A.Fern W.Wong S.Das J.Irvine J.Y.Lee D.Koutra C.Faloutsos D.D.Corkill L.Friedland A.Gentzel D.Jensen
Talks about:
databas (1) threat (1) detect (1) corpor (1) comput (1) insid (1) activ (1) usag (1) real (1)
Person: Andrew Emmott
DBLP: Emmott:Andrew
Contributed to:
Wrote 1 papers:
- KDD-2013-SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ #database #detection #process
- Detecting insider threats in a real corporate database of computer usage activity (TES, HGG, AM, WTY, BR, RP, DH, MR, DAB, EC, IAE, JJ, VB, DHC, OG, OK, AZ, EB, RLMI, RM, LW, TGD, AF, WKW, SD, AE, JI, JYL, DK, CF, DDC, LF, AG, DJ), pp. 1393–1401.