Key points are not available for this paper at this time.
The threat of malicious insider activity continues to be of paramount concern in both the public and private sectors. Though there is great interest in advancing the state of the art in predicting and stopping these threats, the difficulty of obtaining suitable data for research, development, and testing remains a significant hinderance. We outline the use of synthetic data to enable progress in one research program, while discussing the benefits and limitations of synthetic insider threat data, the meaning of realism in this context, as well as future research directions.
Building similarity graph...
Analyzing shared references across papers
Loading...
Glasser et al. (Wed,) studied this question.
www.synapsesocial.com/papers/69dbef22f7e0c66ced836efa — DOI: https://doi.org/10.1109/spw.2013.37
Synapse has enriched 5 closely related papers on similar clinical questions. Consider them for comparative context:
Joshua Glasser
Brian Lindauer
Carnegie Mellon University
University of Rochester
Software Engineering Institute
Building similarity graph...
Analyzing shared references across papers
Loading...