Insider Threat Detection (IMAGE)
Caption
To develop new approaches for identifying “insider threats” before an incident occurs, Georgia Tech researchers will have access to massive data sets collected from operational environments where individuals have explicitly agreed to be monitored. The information will include electronically recorded activities, such as computer logins, emails, instant messages and file transfers.
Credit
Georgia Tech/Rick Robinson
Usage Restrictions
None
License
Licensed content