X
  • Researchers from Georgia Tech are helping to create a suite of algorithms that can detect multiple types of insider threats by analyzing massive amounts of data for unusual activity. The Georgia Tech research team includes (left-right) Erica Briscoe, Andy Register, David A. Bader, Richard Boyd, Anita Zakrzewska, Oded Green, Lora Weiss, Edmond Chow and Oguz Kaya.
    Georgia Tech/Gary Meek
    Researchers from Georgia Tech are helping to create a suite of algorithms that can detect multiple types of insider threats by analyzing massive amounts of data for unusual activity. The Georgia Tech research team includes (left-right) Erica Briscoe, Andy Register, David A. Bader, Richard Boyd, Anita Zakrzewska, Oded Green, Lora Weiss, Edmond Chow and Oguz Kaya.
  • To develop new approaches for identifying “insider threats” before an incident occurs, Georgia Tech researchers will have access to massive data sets collected from operational environments where individuals have explicitly agreed to be monitored. The information will include electronically recorded activities, such as computer logins, emails, instant messages and file transfers.
    Georgia Tech/Rick Robinson
    To develop new approaches for identifying “insider threats” before an incident occurs, Georgia Tech researchers will have access to massive data sets collected from operational environments where individuals have explicitly agreed to be monitored. The information will include electronically recorded activities, such as computer logins, emails, instant messages and file transfers.
  • Georgia Tech researchers (left-right) Lora Weiss, Edmond Chow, Richard Boyd, David A. Bader and Erica Briscoe are supporting key components of a DARPA program aimed at developing new approaches for identifying “insider threats” before an incident occurs.
    Georgia Tech/Gary Meek
    Georgia Tech researchers (left-right) Lora Weiss, Edmond Chow, Richard Boyd, David A. Bader and Erica Briscoe are supporting key components of a DARPA program aimed at developing new approaches for identifying “insider threats” before an incident occurs.
Chat now!