2018 (modified: 12 Dec 2021)Int. J. Softw. Eng. Knowl. Eng. 2018Readers: Everyone
Abstract:An intruder of a company’s network may use stolen login credentials to silently collect sensitive data. Such malicious user behavior is difficult to detect as long as it does not trigger access vio...