Travelled to:
1 × USA
Collaborated with:
T.E.Senator H.G.Goldberg A.Memory W.T.Young B.Rees R.Pierce D.Huang M.Reardon D.A.Bader E.Chow I.A.Essa J.Jones V.Bettadapura D.H.Chau O.Green O.Kaya A.Zakrzewska E.Briscoe R.L.M.IV R.McColl L.Weiss T.G.Dietterich A.Fern W.Wong S.Das A.Emmott J.Y.Lee D.Koutra C.Faloutsos D.D.Corkill L.Friedland A.Gentzel D.Jensen
Talks about:
databas (1) threat (1) detect (1) corpor (1) comput (1) insid (1) activ (1) usag (1) real (1)
Person: Jed Irvine
DBLP: Irvine:Jed
Contributed to:
Wrote 1 papers:
- KDD-2013-SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ #database #detection #process
- Detecting insider threats in a real corporate database of computer usage activity (TES, HGG, AM, WTY, BR, RP, DH, MR, DAB, EC, IAE, JJ, VB, DHC, OG, OK, AZ, EB, RLMI, RM, LW, TGD, AF, WKW, SD, AE, JI, JYL, DK, CF, DDC, LF, AG, DJ), pp. 1393–1401.