CL Huth,
DW Chadwick, WR Claycomb… - Information Systems …, 2013 - Springer
The challenges of preventing, detecting, and responding to data leakage propagated by
authorized users, or insider threats, are among the most difficult facing security researchers …